SlideShare a Scribd company logo
1 of 24
Md: Mahmudle Hassan
Department of Civil Eng.
At Daffodil International University
https://www.facebook.com/MHMMEHEDI12
Website: https://needtune.blogspot.com
Matrices
 A rectangular arrangement of numbers in rows and
columns.
 It is the Combination of linear equation.
 It is Represented by these symbols:
[], ||,()
EXAMPLE






197
324
)a










29
37
05
)b
 381) c 









512
348
1097
)d
row
column column
row
row
column column
row
DIMENSIONS OF THE MATRIX
Row (m)






234
012
Column(n)
A matrix with m rows and n columns is called a matrix with dimensions m x n
(# no. of row) x ( # no. of
column)
This is a 2 X 3 matrix
DIMENSIONS OF THE
MATRIX :
Types of Matrices
1. Row matrices – A matrices which has only one row
called row matrices e.g.-
[123]1*3
2. Column matrices – A matrices which has only one column
is called column matrices e.g. –
Null matrix is a matrix with all its entries being zero.
123
456
789
3 ∗ 3
No of rows = No of column
A square matrices who’s main diagonal is ascent value ‘1’
and each of the other element is ‘0’
100
010
001
3 ∗ 3 ,
10
01
2 ∗ 2, 1 1 ∗ 1
A square matrices all of who’s element expect those in
the leading diagonal are ‘0’
A diagonal matrices in which all the elements of main
diagonal is same called scalar matrices.
3*3
There are two types triangular matrices ---
1.Upper triangular: All the below elements are ‘0’.
2.Lower triangular: All the above elements are ‘0’
123
045
006
3 ∗ 3
100
230
456
3 ∗ 3
 A matrices obtained by inter changing the rows and
columns of a matrices.
 It is denoted by A’ , AT
A⇒
123
456
789
3 ∗ 3 AT
⇒
147
258
369
3 ∗ 3
 Cryptography is the process of encrypting data so that
third party can’t read it and privacy can be maintained.
 It was started with the TV cable industries where even
people who were not the customer could watch the TV
programs
 Videocipher encryption system was invented which
would convert signals into digital form i.e. encrypt it,
and the data were send over the satellite.
 Since we are using a 3 by 3 matrix, we break the enumerated message
above into a sequence of 3 by 1 vectors:
 Note that it was necessary to add a space at the end of the message to
complete the last vector.
 We encode the message by multiplying each of the above vectors by the
encoding matrix.
 We represent above vectors as columns of a matrix and perform its
matrix multiplication with the encoding matrix






































































27
5
20
1
9
20
15
7
5
14
27
15
20
27
5
18
1
16
5
18
16



















 
271151420185
5972727118
202051551616
434
110
433
 matrices are used for taking seismic surveys.
 They are used for plotting graphs, statistics and also to
do scientific studies in almost different fields.
 matrices are applied in the study of electrical circuits,
quantum mechanics and optics.
 In the calculation of battery power outputs, resistor
conversion of electrical energy into another useful
energy, these matrices play a major role in
calculations.
 Especially in solving the problems using Kirchoff’s
laws of voltage and current, the matrices are essential.
 First, write a numerical value for each letter i.e. A=1,
B=2, and Z=26, and space=27.
 The data should be placed in matrix form i.e. in 2x1 or
3x1 matrix form.
 The data should be multiplied by given encoding
matrix.
 Then, write the answer (value after multiplying) in
linear form. How to encrypt data? Encryption Process
 matrices play a vital role in the projection of three
dimensional image into a two dimensional screen,
creating the realistic seeming motions.
 Stochastic matrices and Eigen vector solvers are used
in the page rank algorithms which are used in the
ranking of web pages in Google search.
 The matrix calculus is used in the generalization of
analytical notions like exponentials and derivatives to
their higher dimensions.
 One of the most important usages of matrices in
computer side applications are encryption of message
codes.
 Matrices and their inverse matrices are used for a
programmer for coding or encrypting a message.
 Matrices are used in representing the real world data’s like the traits of people’s
population, habits, etc.
 They are best representation methods for plotting the common survey things.

 • Matrices are used in calculating the gross domestic products in economics which
eventually helps in calculating the goods production efficiently.

 • Matrices are used in many organizations such as for scientists for recording the data
for their experiments.

 • In robotics and automation, matrices are the base elements for the robot movements.
 The movements of the robots are programmed with the calculation of matrices’ rows and
columns.
 The inputs for controlling robots are given based on the calculations from matrices.
Matrix and it's Application

More Related Content

What's hot

Appilation of matrices in real life
Appilation of matrices in real lifeAppilation of matrices in real life
Appilation of matrices in real lifeStudent
 
Matrix and it's application
Matrix and it's application Matrix and it's application
Matrix and it's application MOHAMMAD AKASH
 
Application of matrices in real life and matrix
Application of matrices in real life and matrixApplication of matrices in real life and matrix
Application of matrices in real life and matrixDarshDobariya
 
Matrices And Application Of Matrices
Matrices And Application Of MatricesMatrices And Application Of Matrices
Matrices And Application Of Matricesmailrenuka
 
Use of matrix in daily life
Use of matrix in daily lifeUse of matrix in daily life
Use of matrix in daily lifesadia Afrose
 
Matrices in computer applications
Matrices in computer applicationsMatrices in computer applications
Matrices in computer applicationsRayyan777
 
Applications of Matrices in Engineering
Applications of Matrices in EngineeringApplications of Matrices in Engineering
Applications of Matrices in EngineeringAliHasan358
 
Matrix in real life.pptx
Matrix in real life.pptxMatrix in real life.pptx
Matrix in real life.pptxShahinSafana
 
Applications of linear algebra in computer science
Applications of linear algebra in computer scienceApplications of linear algebra in computer science
Applications of linear algebra in computer scienceArnob Khan
 
Cryptography an application of vectors and matrices
Cryptography an application of vectors and matricesCryptography an application of vectors and matrices
Cryptography an application of vectors and matricesdianasc04
 
presentation on matrix
 presentation on matrix presentation on matrix
presentation on matrixNikhi Jain
 
Application of linear algebra in cse
Application of linear algebra in cseApplication of linear algebra in cse
Application of linear algebra in cseArnob Khan
 
Application of Matrices on Cryptography
Application of Matrices on CryptographyApplication of Matrices on Cryptography
Application of Matrices on CryptographyRam Gupta
 
The History of Mathematics and Application of Matrices.pptx
The History of Mathematics and Application of Matrices.pptxThe History of Mathematics and Application of Matrices.pptx
The History of Mathematics and Application of Matrices.pptxSamjhauta Thapa
 
Matrices And Determinants
Matrices And DeterminantsMatrices And Determinants
Matrices And DeterminantsDEVIKA S INDU
 

What's hot (20)

Appilation of matrices in real life
Appilation of matrices in real lifeAppilation of matrices in real life
Appilation of matrices in real life
 
Matrix and it's application
Matrix and it's application Matrix and it's application
Matrix and it's application
 
Application of matrices in real life and matrix
Application of matrices in real life and matrixApplication of matrices in real life and matrix
Application of matrices in real life and matrix
 
Matrices And Application Of Matrices
Matrices And Application Of MatricesMatrices And Application Of Matrices
Matrices And Application Of Matrices
 
Application of matrices in real life
Application of matrices in real lifeApplication of matrices in real life
Application of matrices in real life
 
Application of Matrices
Application of MatricesApplication of Matrices
Application of Matrices
 
Use of matrix in daily life
Use of matrix in daily lifeUse of matrix in daily life
Use of matrix in daily life
 
Matrices in computer applications
Matrices in computer applicationsMatrices in computer applications
Matrices in computer applications
 
Applications of Matrix
Applications of MatrixApplications of Matrix
Applications of Matrix
 
Applications of Matrices in Engineering
Applications of Matrices in EngineeringApplications of Matrices in Engineering
Applications of Matrices in Engineering
 
Matrix in real life.pptx
Matrix in real life.pptxMatrix in real life.pptx
Matrix in real life.pptx
 
Applications of linear algebra in computer science
Applications of linear algebra in computer scienceApplications of linear algebra in computer science
Applications of linear algebra in computer science
 
Cryptography an application of vectors and matrices
Cryptography an application of vectors and matricesCryptography an application of vectors and matrices
Cryptography an application of vectors and matrices
 
Matrix in software engineering
Matrix in software engineeringMatrix in software engineering
Matrix in software engineering
 
Introduction of matrices
Introduction of matricesIntroduction of matrices
Introduction of matrices
 
presentation on matrix
 presentation on matrix presentation on matrix
presentation on matrix
 
Application of linear algebra in cse
Application of linear algebra in cseApplication of linear algebra in cse
Application of linear algebra in cse
 
Application of Matrices on Cryptography
Application of Matrices on CryptographyApplication of Matrices on Cryptography
Application of Matrices on Cryptography
 
The History of Mathematics and Application of Matrices.pptx
The History of Mathematics and Application of Matrices.pptxThe History of Mathematics and Application of Matrices.pptx
The History of Mathematics and Application of Matrices.pptx
 
Matrices And Determinants
Matrices And DeterminantsMatrices And Determinants
Matrices And Determinants
 

Similar to Matrix and it's Application

Application of discrete mathematics in IT
Application of discrete mathematics in ITApplication of discrete mathematics in IT
Application of discrete mathematics in ITShahidAbbas52
 
Analysis of Impact of Graph Theory in Computer Application
Analysis of Impact of Graph Theory in Computer ApplicationAnalysis of Impact of Graph Theory in Computer Application
Analysis of Impact of Graph Theory in Computer ApplicationIRJET Journal
 
Matrix in real life
Matrix in real life Matrix in real life
Matrix in real life AdnanAddy4
 
Bivariatealgebraic integerencoded arai algorithm for
Bivariatealgebraic integerencoded arai algorithm forBivariatealgebraic integerencoded arai algorithm for
Bivariatealgebraic integerencoded arai algorithm foreSAT Publishing House
 
Data Processing Techniques for 3D Surface Morphology
Data Processing Techniques for 3D Surface MorphologyData Processing Techniques for 3D Surface Morphology
Data Processing Techniques for 3D Surface Morphologytheijes
 
A Comparative study of K-SVD and WSQ Algorithms in Fingerprint Compression Te...
A Comparative study of K-SVD and WSQ Algorithms in Fingerprint Compression Te...A Comparative study of K-SVD and WSQ Algorithms in Fingerprint Compression Te...
A Comparative study of K-SVD and WSQ Algorithms in Fingerprint Compression Te...IRJET Journal
 
IRJET - Application of Linear Algebra in Machine Learning
IRJET -  	  Application of Linear Algebra in Machine LearningIRJET -  	  Application of Linear Algebra in Machine Learning
IRJET - Application of Linear Algebra in Machine LearningIRJET Journal
 
IRJET-Handwritten Digit Classification using Machine Learning Models
IRJET-Handwritten Digit Classification using Machine Learning ModelsIRJET-Handwritten Digit Classification using Machine Learning Models
IRJET-Handwritten Digit Classification using Machine Learning ModelsIRJET Journal
 
Semantic Segmentation Of Aerial Image.pptx
Semantic Segmentation Of Aerial Image.pptxSemantic Segmentation Of Aerial Image.pptx
Semantic Segmentation Of Aerial Image.pptxBikashSingh913806
 
Application Of Graph Theory
Application Of Graph TheoryApplication Of Graph Theory
Application Of Graph TheoryMaria Perkins
 
Application's of Numerical Math in CSE
Application's of Numerical Math in CSEApplication's of Numerical Math in CSE
Application's of Numerical Math in CSEsanjana mun
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Editor IJARCET
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Editor IJARCET
 
Segmentation and recognition of handwritten digit numeral string using a mult...
Segmentation and recognition of handwritten digit numeral string using a mult...Segmentation and recognition of handwritten digit numeral string using a mult...
Segmentation and recognition of handwritten digit numeral string using a mult...ijfcstjournal
 
An Efficient Approach for Enhancing the Security of Amazigh Text using Binary...
An Efficient Approach for Enhancing the Security of Amazigh Text using Binary...An Efficient Approach for Enhancing the Security of Amazigh Text using Binary...
An Efficient Approach for Enhancing the Security of Amazigh Text using Binary...Editor IJCATR
 
Role of Mathematics in Computer Science.pptx
Role of Mathematics in Computer Science.pptxRole of Mathematics in Computer Science.pptx
Role of Mathematics in Computer Science.pptxAshishPandey502
 

Similar to Matrix and it's Application (20)

Matrix
MatrixMatrix
Matrix
 
Application of discrete mathematics in IT
Application of discrete mathematics in ITApplication of discrete mathematics in IT
Application of discrete mathematics in IT
 
N41049093
N41049093N41049093
N41049093
 
Analysis of Impact of Graph Theory in Computer Application
Analysis of Impact of Graph Theory in Computer ApplicationAnalysis of Impact of Graph Theory in Computer Application
Analysis of Impact of Graph Theory in Computer Application
 
Matrix in real life
Matrix in real life Matrix in real life
Matrix in real life
 
Bivariatealgebraic integerencoded arai algorithm for
Bivariatealgebraic integerencoded arai algorithm forBivariatealgebraic integerencoded arai algorithm for
Bivariatealgebraic integerencoded arai algorithm for
 
Data Processing Techniques for 3D Surface Morphology
Data Processing Techniques for 3D Surface MorphologyData Processing Techniques for 3D Surface Morphology
Data Processing Techniques for 3D Surface Morphology
 
A Comparative study of K-SVD and WSQ Algorithms in Fingerprint Compression Te...
A Comparative study of K-SVD and WSQ Algorithms in Fingerprint Compression Te...A Comparative study of K-SVD and WSQ Algorithms in Fingerprint Compression Te...
A Comparative study of K-SVD and WSQ Algorithms in Fingerprint Compression Te...
 
IRJET - Application of Linear Algebra in Machine Learning
IRJET -  	  Application of Linear Algebra in Machine LearningIRJET -  	  Application of Linear Algebra in Machine Learning
IRJET - Application of Linear Algebra in Machine Learning
 
IRJET-Handwritten Digit Classification using Machine Learning Models
IRJET-Handwritten Digit Classification using Machine Learning ModelsIRJET-Handwritten Digit Classification using Machine Learning Models
IRJET-Handwritten Digit Classification using Machine Learning Models
 
Ia3613981403
Ia3613981403Ia3613981403
Ia3613981403
 
Ia3613981403
Ia3613981403Ia3613981403
Ia3613981403
 
Semantic Segmentation Of Aerial Image.pptx
Semantic Segmentation Of Aerial Image.pptxSemantic Segmentation Of Aerial Image.pptx
Semantic Segmentation Of Aerial Image.pptx
 
Application Of Graph Theory
Application Of Graph TheoryApplication Of Graph Theory
Application Of Graph Theory
 
Application's of Numerical Math in CSE
Application's of Numerical Math in CSEApplication's of Numerical Math in CSE
Application's of Numerical Math in CSE
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147
 
Segmentation and recognition of handwritten digit numeral string using a mult...
Segmentation and recognition of handwritten digit numeral string using a mult...Segmentation and recognition of handwritten digit numeral string using a mult...
Segmentation and recognition of handwritten digit numeral string using a mult...
 
An Efficient Approach for Enhancing the Security of Amazigh Text using Binary...
An Efficient Approach for Enhancing the Security of Amazigh Text using Binary...An Efficient Approach for Enhancing the Security of Amazigh Text using Binary...
An Efficient Approach for Enhancing the Security of Amazigh Text using Binary...
 
Role of Mathematics in Computer Science.pptx
Role of Mathematics in Computer Science.pptxRole of Mathematics in Computer Science.pptx
Role of Mathematics in Computer Science.pptx
 

Recently uploaded

What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 

Recently uploaded (20)

What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 

Matrix and it's Application

  • 1. Md: Mahmudle Hassan Department of Civil Eng. At Daffodil International University https://www.facebook.com/MHMMEHEDI12 Website: https://needtune.blogspot.com
  • 2. Matrices  A rectangular arrangement of numbers in rows and columns.  It is the Combination of linear equation.  It is Represented by these symbols: [], ||,()
  • 3. EXAMPLE       197 324 )a           29 37 05 )b  381) c           512 348 1097 )d row column column row row column column row
  • 4. DIMENSIONS OF THE MATRIX Row (m)       234 012 Column(n) A matrix with m rows and n columns is called a matrix with dimensions m x n (# no. of row) x ( # no. of column) This is a 2 X 3 matrix DIMENSIONS OF THE MATRIX :
  • 5. Types of Matrices 1. Row matrices – A matrices which has only one row called row matrices e.g.- [123]1*3 2. Column matrices – A matrices which has only one column is called column matrices e.g. –
  • 6. Null matrix is a matrix with all its entries being zero.
  • 7. 123 456 789 3 ∗ 3 No of rows = No of column
  • 8. A square matrices who’s main diagonal is ascent value ‘1’ and each of the other element is ‘0’ 100 010 001 3 ∗ 3 , 10 01 2 ∗ 2, 1 1 ∗ 1
  • 9. A square matrices all of who’s element expect those in the leading diagonal are ‘0’
  • 10. A diagonal matrices in which all the elements of main diagonal is same called scalar matrices. 3*3
  • 11. There are two types triangular matrices --- 1.Upper triangular: All the below elements are ‘0’. 2.Lower triangular: All the above elements are ‘0’ 123 045 006 3 ∗ 3 100 230 456 3 ∗ 3
  • 12.  A matrices obtained by inter changing the rows and columns of a matrices.  It is denoted by A’ , AT A⇒ 123 456 789 3 ∗ 3 AT ⇒ 147 258 369 3 ∗ 3
  • 13.  Cryptography is the process of encrypting data so that third party can’t read it and privacy can be maintained.  It was started with the TV cable industries where even people who were not the customer could watch the TV programs
  • 14.  Videocipher encryption system was invented which would convert signals into digital form i.e. encrypt it, and the data were send over the satellite.
  • 15.  Since we are using a 3 by 3 matrix, we break the enumerated message above into a sequence of 3 by 1 vectors:  Note that it was necessary to add a space at the end of the message to complete the last vector.  We encode the message by multiplying each of the above vectors by the encoding matrix.  We represent above vectors as columns of a matrix and perform its matrix multiplication with the encoding matrix                                                                       27 5 20 1 9 20 15 7 5 14 27 15 20 27 5 18 1 16 5 18 16                      271151420185 5972727118 202051551616 434 110 433
  • 16.
  • 17.  matrices are used for taking seismic surveys.  They are used for plotting graphs, statistics and also to do scientific studies in almost different fields.
  • 18.  matrices are applied in the study of electrical circuits, quantum mechanics and optics.  In the calculation of battery power outputs, resistor conversion of electrical energy into another useful energy, these matrices play a major role in calculations.  Especially in solving the problems using Kirchoff’s laws of voltage and current, the matrices are essential.
  • 19.  First, write a numerical value for each letter i.e. A=1, B=2, and Z=26, and space=27.  The data should be placed in matrix form i.e. in 2x1 or 3x1 matrix form.
  • 20.  The data should be multiplied by given encoding matrix.  Then, write the answer (value after multiplying) in linear form. How to encrypt data? Encryption Process
  • 21.  matrices play a vital role in the projection of three dimensional image into a two dimensional screen, creating the realistic seeming motions.  Stochastic matrices and Eigen vector solvers are used in the page rank algorithms which are used in the ranking of web pages in Google search.
  • 22.  The matrix calculus is used in the generalization of analytical notions like exponentials and derivatives to their higher dimensions.  One of the most important usages of matrices in computer side applications are encryption of message codes.  Matrices and their inverse matrices are used for a programmer for coding or encrypting a message.
  • 23.  Matrices are used in representing the real world data’s like the traits of people’s population, habits, etc.  They are best representation methods for plotting the common survey things.   • Matrices are used in calculating the gross domestic products in economics which eventually helps in calculating the goods production efficiently.   • Matrices are used in many organizations such as for scientists for recording the data for their experiments.   • In robotics and automation, matrices are the base elements for the robot movements.  The movements of the robots are programmed with the calculation of matrices’ rows and columns.  The inputs for controlling robots are given based on the calculations from matrices.