SlideShare a Scribd company logo
1 of 17
Presentation On Application Of
Matrix
Prepared By:
Prerana Bhattarai
139/13
BBA 2nd Semester ‘B’
 Cryptography is the process of encrypting data so that third
party can’t read it and privacy can be maintained.
 It was started with the TV cable industries where even people
who were not the customer could watch the TV programs
 So, Videocipher encryption system was invented which would
convert signals into digital form i.e. encrypt it, and the data were
send over the satellite. The Videocipher box would decrypt the
signal and those satellite dish owner who had Videocipher box
would receive the decrypted signal i.e. the original signal before
encryption.
 In matrix same thing can be done.
Application of Matrix
 First, write a numerical value for each letter i.e. A=1,
B=2, and Z=26, and space=27.
 The data should be placed in matrix form i.e. in 2x1 or
3x1 matrix form.
 The data should be multiplied by given encoding
matrix.
 Then, write the answer (value after multiplying) in
linear form.
How to encrypt data?
Encryption Process
 The encoding matrix be
1 0 −1
0 1 0
0 −1 1
 Then, assign numeric value for “SUBMIT HER YOUR
PLANS” i.e. S=19, U=21, B=2, M=13, I=9, T=20,
space=27, H=8, E=5, R=18, space=27, Y=25, O=15, U=21,
R=18, space=27, P=16, L=12, A=1, N=14, S=19
Example: Let take the message
SUBMIT ME YOUR PLAN
S U B M I T H E R Y O U R P L A N S
19 21 2 13 9 20 27 8 5 18 27 25 15 21 18 27 16 12 1 14 19
 Since we are using a 3 by 3 matrix, we break the
enumerated message above into a sequence of 3 by 1
vectors:
[ ] [ ] [ ] [ ] [ ] [ ] [ ]19
21
2
13
9
20
18
27
25
27
8
5
15
21
18
1
14
19
27
16
12
 The message should be encoded by multiplying the above
3x1 matrix by the given encoding matrix.
19 13 27 18 15 27 1
21 9 8 27 21 16 14
2 20 5 25 18 12 19
1 0 −1
0 1 0
0 −1 1
This gives,
17 -7 22 -7 -3 15 -18
21 9 8 27 21 16 14
-19 11 -3 -2 -3 -4 5
 The columns of this matrix give the encoded message. The
message is transmitted in the following linear form
17, 21, -21, -7, 9, -9, 22, 8, -8, -7, 27, -27, -
3, 21, -21, 15, 16, -16, -18, 14, -14
 The encrypted number should be written in matrix
form.
 The inverse of the encoding matrix should be found.
 Multiply the inverse encoding matrix, i.e. decoding
matrix with the encrypted number.
 Write the answer in linear form.
 Assign 1=A, 2=B and so on and also 27=space.
Decryption Process
 The inverse of the encoding matrix should be taken
out such as:
1 1 1
0 1 0
0 1 1
Thus, to decode the message,
perform the matrix multiplication
and get the matrix
1 1 1
0 1 0
0 1 1
17 -7 22 -7 -3 15 -18
21 9 8 27 21 16 14
-19 11 -3 -2 -3 -4 5
19 13 27 18 15 27 1
21 9 8 27 21 16 14
2 20 5 25 18 12 19
 The columns of this matrix, written in linear form,
give the original message:
S U B M I T H E R Y O U R P L A N S
19 21 2 13 9 20 27 8 5 18 27 25 15 21 18 27 16 12 1 14 19
 Many geologists make use certain types of matrices
for seismic surveys. The seismic survey is one form of
geophysical survey that aims at measuring the earth’s
(geo-) properties by means of physical (-physics)
principles such as magnetic, electric, gravitational,
thermal, and elastic theories.
Seismic Surveys
 Matrices are used to calculate gross domestic product
in economics, and help in calculation for producing
goods more efficiently. It is seen that through input-
output analysis that is used in matrix a researcher can
get information about what level of output should be
of each industry at the existing technology.
In economics
 Matrix transforms are very useful within the world of
computer graphics. Software and hardware graphics
processor uses matrices for performing operations
such as scaling, translation, reflection and rotation.
Computer Animations
 Matrices are very useful for organization, like for
scientists who have to record the data from their
experiments if it includes numbers.
 In engineering, math reports are recorded using
matrices.
 And in architecture, matrices are used with
computing. If needed, it will be very easy to add the
data together, like with matrices in mathematics.
Other uses…
ANY QUESTIONS?

More Related Content

What's hot

Engineering mathematics presentation
Engineering mathematics presentationEngineering mathematics presentation
Engineering mathematics presentationAfzal Hossen
 
Matrix and it's Application
Matrix and it's ApplicationMatrix and it's Application
Matrix and it's ApplicationMahmudle Hassan
 
Matrices in computer applications
Matrices in computer applicationsMatrices in computer applications
Matrices in computer applicationsRayyan777
 
Applications of Matrices
Applications of MatricesApplications of Matrices
Applications of Matricessanthosh kumar
 
Applications of matrices in real life
Applications of matrices in real lifeApplications of matrices in real life
Applications of matrices in real lifeSuhaibFaiz
 
Application of linear algebra in cse
Application of linear algebra in cseApplication of linear algebra in cse
Application of linear algebra in cseArnob Khan
 
BASICS OF MATRICES WITH APPLICATION IN ENGINEERING
BASICS OF MATRICES WITH APPLICATION IN ENGINEERINGBASICS OF MATRICES WITH APPLICATION IN ENGINEERING
BASICS OF MATRICES WITH APPLICATION IN ENGINEERINGRoshan Bhagat
 
Application of Matrices on Cryptography
Application of Matrices on CryptographyApplication of Matrices on Cryptography
Application of Matrices on CryptographyRam Gupta
 
Matrix and its applications by mohammad imran
Matrix and its applications by mohammad imranMatrix and its applications by mohammad imran
Matrix and its applications by mohammad imranMohammad Imran
 
Linear Algebra Applications
Linear Algebra ApplicationsLinear Algebra Applications
Linear Algebra ApplicationsRamesh Shashank
 
Appilation of matrices in real life
Appilation of matrices in real lifeAppilation of matrices in real life
Appilation of matrices in real lifeStudent
 
MATRICES
MATRICESMATRICES
MATRICESfaijmsk
 
Application of Matrices in real life
Application of Matrices in real lifeApplication of Matrices in real life
Application of Matrices in real lifeShayshab Azad
 
The History of Mathematics and Application of Matrices.pptx
The History of Mathematics and Application of Matrices.pptxThe History of Mathematics and Application of Matrices.pptx
The History of Mathematics and Application of Matrices.pptxSamjhauta Thapa
 

What's hot (20)

Engineering mathematics presentation
Engineering mathematics presentationEngineering mathematics presentation
Engineering mathematics presentation
 
Matrix and it's Application
Matrix and it's ApplicationMatrix and it's Application
Matrix and it's Application
 
Application of Matrices
Application of MatricesApplication of Matrices
Application of Matrices
 
Matrices in computer applications
Matrices in computer applicationsMatrices in computer applications
Matrices in computer applications
 
Applications of Matrices
Applications of MatricesApplications of Matrices
Applications of Matrices
 
Applications of matrices in real life
Applications of matrices in real lifeApplications of matrices in real life
Applications of matrices in real life
 
Applications of Linear Algebra
Applications of Linear AlgebraApplications of Linear Algebra
Applications of Linear Algebra
 
Application of linear algebra in cse
Application of linear algebra in cseApplication of linear algebra in cse
Application of linear algebra in cse
 
BASICS OF MATRICES WITH APPLICATION IN ENGINEERING
BASICS OF MATRICES WITH APPLICATION IN ENGINEERINGBASICS OF MATRICES WITH APPLICATION IN ENGINEERING
BASICS OF MATRICES WITH APPLICATION IN ENGINEERING
 
Application of Matrices on Cryptography
Application of Matrices on CryptographyApplication of Matrices on Cryptography
Application of Matrices on Cryptography
 
Matrix and its applications by mohammad imran
Matrix and its applications by mohammad imranMatrix and its applications by mohammad imran
Matrix and its applications by mohammad imran
 
Application of matrices in real life
Application of matrices in real lifeApplication of matrices in real life
Application of matrices in real life
 
Linear Algebra Applications
Linear Algebra ApplicationsLinear Algebra Applications
Linear Algebra Applications
 
Appilation of matrices in real life
Appilation of matrices in real lifeAppilation of matrices in real life
Appilation of matrices in real life
 
Maths Project Power Point Presentation
Maths Project Power Point PresentationMaths Project Power Point Presentation
Maths Project Power Point Presentation
 
MATRICES
MATRICESMATRICES
MATRICES
 
Application of Matrices in real life
Application of Matrices in real lifeApplication of Matrices in real life
Application of Matrices in real life
 
Introduction of matrices
Introduction of matricesIntroduction of matrices
Introduction of matrices
 
The History of Mathematics and Application of Matrices.pptx
The History of Mathematics and Application of Matrices.pptxThe History of Mathematics and Application of Matrices.pptx
The History of Mathematics and Application of Matrices.pptx
 
Matrix in software engineering
Matrix in software engineeringMatrix in software engineering
Matrix in software engineering
 

Viewers also liked

Introduction to MATrices LABoratory (MATLAB) as Part of Digital Signal Proces...
Introduction to MATrices LABoratory (MATLAB) as Part of Digital Signal Proces...Introduction to MATrices LABoratory (MATLAB) as Part of Digital Signal Proces...
Introduction to MATrices LABoratory (MATLAB) as Part of Digital Signal Proces...Ahmed Gad
 
Understanding Quadrilaterals
Understanding QuadrilateralsUnderstanding Quadrilaterals
Understanding QuadrilateralsSajeelK
 
polynomials class 9th
polynomials class 9thpolynomials class 9th
polynomials class 9thastha11
 
Matrices and determinants
Matrices and determinantsMatrices and determinants
Matrices and determinantsoscar
 
Quadrilaterals
QuadrilateralsQuadrilaterals
QuadrilateralsHome
 
Mathsproject quadrilaterals
Mathsproject quadrilateralsMathsproject quadrilaterals
Mathsproject quadrilateralsshaunakk
 
Probability Overview
Probability OverviewProbability Overview
Probability Overviewmmeddin
 
Classifying Angles
Classifying AnglesClassifying Angles
Classifying Anglesdebrahanks
 
presentation on matrix
 presentation on matrix presentation on matrix
presentation on matrixNikhi Jain
 
Basic Concept Of Probability
Basic Concept Of ProbabilityBasic Concept Of Probability
Basic Concept Of Probabilityguest45a926
 
Probability Powerpoint
Probability PowerpointProbability Powerpoint
Probability Powerpointspike2904
 
PROBABILITY
PROBABILITYPROBABILITY
PROBABILITYVIV13
 

Viewers also liked (18)

Introduction to MATrices LABoratory (MATLAB) as Part of Digital Signal Proces...
Introduction to MATrices LABoratory (MATLAB) as Part of Digital Signal Proces...Introduction to MATrices LABoratory (MATLAB) as Part of Digital Signal Proces...
Introduction to MATrices LABoratory (MATLAB) as Part of Digital Signal Proces...
 
Understanding Quadrilaterals
Understanding QuadrilateralsUnderstanding Quadrilaterals
Understanding Quadrilaterals
 
polynomials class 9th
polynomials class 9thpolynomials class 9th
polynomials class 9th
 
Matrices and determinants
Matrices and determinantsMatrices and determinants
Matrices and determinants
 
Quadrilaterals
QuadrilateralsQuadrilaterals
Quadrilaterals
 
Angles ppt
Angles pptAngles ppt
Angles ppt
 
Mathsproject quadrilaterals
Mathsproject quadrilateralsMathsproject quadrilaterals
Mathsproject quadrilaterals
 
Triangles
TrianglesTriangles
Triangles
 
Triangles
TrianglesTriangles
Triangles
 
Probability Overview
Probability OverviewProbability Overview
Probability Overview
 
Classifying Angles
Classifying AnglesClassifying Angles
Classifying Angles
 
Triangle ppt
Triangle pptTriangle ppt
Triangle ppt
 
presentation on matrix
 presentation on matrix presentation on matrix
presentation on matrix
 
Lines and angles
Lines and anglesLines and angles
Lines and angles
 
Types of angles
Types of anglesTypes of angles
Types of angles
 
Basic Concept Of Probability
Basic Concept Of ProbabilityBasic Concept Of Probability
Basic Concept Of Probability
 
Probability Powerpoint
Probability PowerpointProbability Powerpoint
Probability Powerpoint
 
PROBABILITY
PROBABILITYPROBABILITY
PROBABILITY
 

Similar to Presentation on application of matrix

Applications of linear algebra in computer science
Applications of linear algebra in computer scienceApplications of linear algebra in computer science
Applications of linear algebra in computer scienceArnob Khan
 
IRJET-An Effective Strategy for Defense & Medical Pictures Security by Singul...
IRJET-An Effective Strategy for Defense & Medical Pictures Security by Singul...IRJET-An Effective Strategy for Defense & Medical Pictures Security by Singul...
IRJET-An Effective Strategy for Defense & Medical Pictures Security by Singul...IRJET Journal
 
BER ENHANCEMENT OF MIMO-CDMA BASED ON SPACE-TIME BLOCK CODES
BER ENHANCEMENT OF MIMO-CDMA BASED ON SPACE-TIME BLOCK CODESBER ENHANCEMENT OF MIMO-CDMA BASED ON SPACE-TIME BLOCK CODES
BER ENHANCEMENT OF MIMO-CDMA BASED ON SPACE-TIME BLOCK CODEScscpconf
 
Bivariatealgebraic integerencoded arai algorithm for
Bivariatealgebraic integerencoded arai algorithm forBivariatealgebraic integerencoded arai algorithm for
Bivariatealgebraic integerencoded arai algorithm foreSAT Publishing House
 
FPGA IMPLEMENTATION OF SOFT OUTPUT VITERBI ALGORITHM USING MEMORYLESS HYBRID ...
FPGA IMPLEMENTATION OF SOFT OUTPUT VITERBI ALGORITHM USING MEMORYLESS HYBRID ...FPGA IMPLEMENTATION OF SOFT OUTPUT VITERBI ALGORITHM USING MEMORYLESS HYBRID ...
FPGA IMPLEMENTATION OF SOFT OUTPUT VITERBI ALGORITHM USING MEMORYLESS HYBRID ...VLSICS Design
 
FPGA Implementation of Soft Output Viterbi Algorithm Using Memoryless Hybrid ...
FPGA Implementation of Soft Output Viterbi Algorithm Using Memoryless Hybrid ...FPGA Implementation of Soft Output Viterbi Algorithm Using Memoryless Hybrid ...
FPGA Implementation of Soft Output Viterbi Algorithm Using Memoryless Hybrid ...VLSICS Design
 
Ijarcet vol-2-issue-7-2223-2229
Ijarcet vol-2-issue-7-2223-2229Ijarcet vol-2-issue-7-2223-2229
Ijarcet vol-2-issue-7-2223-2229Editor IJARCET
 
Ijarcet vol-2-issue-7-2223-2229
Ijarcet vol-2-issue-7-2223-2229Ijarcet vol-2-issue-7-2223-2229
Ijarcet vol-2-issue-7-2223-2229Editor IJARCET
 
Matrix in real life.pptx
Matrix in real life.pptxMatrix in real life.pptx
Matrix in real life.pptxShahinSafana
 
Analysis of Impact of Graph Theory in Computer Application
Analysis of Impact of Graph Theory in Computer ApplicationAnalysis of Impact of Graph Theory in Computer Application
Analysis of Impact of Graph Theory in Computer ApplicationIRJET Journal
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSIJNSA Journal
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSIJNSA Journal
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSIJNSA Journal
 
11.secure compressed image transmission using self organizing feature maps
11.secure compressed image transmission using self organizing feature maps11.secure compressed image transmission using self organizing feature maps
11.secure compressed image transmission using self organizing feature mapsAlexander Decker
 
project ppt on anti counterfeiting technique for credit card transaction system
project ppt on anti counterfeiting technique for credit card transaction systemproject ppt on anti counterfeiting technique for credit card transaction system
project ppt on anti counterfeiting technique for credit card transaction systemRekha dudiya
 

Similar to Presentation on application of matrix (20)

Matrix
MatrixMatrix
Matrix
 
Applications of linear algebra in computer science
Applications of linear algebra in computer scienceApplications of linear algebra in computer science
Applications of linear algebra in computer science
 
IRJET-An Effective Strategy for Defense & Medical Pictures Security by Singul...
IRJET-An Effective Strategy for Defense & Medical Pictures Security by Singul...IRJET-An Effective Strategy for Defense & Medical Pictures Security by Singul...
IRJET-An Effective Strategy for Defense & Medical Pictures Security by Singul...
 
Journal_ICACT
Journal_ICACTJournal_ICACT
Journal_ICACT
 
paper
paperpaper
paper
 
BER ENHANCEMENT OF MIMO-CDMA BASED ON SPACE-TIME BLOCK CODES
BER ENHANCEMENT OF MIMO-CDMA BASED ON SPACE-TIME BLOCK CODESBER ENHANCEMENT OF MIMO-CDMA BASED ON SPACE-TIME BLOCK CODES
BER ENHANCEMENT OF MIMO-CDMA BASED ON SPACE-TIME BLOCK CODES
 
Report
ReportReport
Report
 
Bivariatealgebraic integerencoded arai algorithm for
Bivariatealgebraic integerencoded arai algorithm forBivariatealgebraic integerencoded arai algorithm for
Bivariatealgebraic integerencoded arai algorithm for
 
FPGA IMPLEMENTATION OF SOFT OUTPUT VITERBI ALGORITHM USING MEMORYLESS HYBRID ...
FPGA IMPLEMENTATION OF SOFT OUTPUT VITERBI ALGORITHM USING MEMORYLESS HYBRID ...FPGA IMPLEMENTATION OF SOFT OUTPUT VITERBI ALGORITHM USING MEMORYLESS HYBRID ...
FPGA IMPLEMENTATION OF SOFT OUTPUT VITERBI ALGORITHM USING MEMORYLESS HYBRID ...
 
FPGA Implementation of Soft Output Viterbi Algorithm Using Memoryless Hybrid ...
FPGA Implementation of Soft Output Viterbi Algorithm Using Memoryless Hybrid ...FPGA Implementation of Soft Output Viterbi Algorithm Using Memoryless Hybrid ...
FPGA Implementation of Soft Output Viterbi Algorithm Using Memoryless Hybrid ...
 
E04612529
E04612529E04612529
E04612529
 
Ijarcet vol-2-issue-7-2223-2229
Ijarcet vol-2-issue-7-2223-2229Ijarcet vol-2-issue-7-2223-2229
Ijarcet vol-2-issue-7-2223-2229
 
Ijarcet vol-2-issue-7-2223-2229
Ijarcet vol-2-issue-7-2223-2229Ijarcet vol-2-issue-7-2223-2229
Ijarcet vol-2-issue-7-2223-2229
 
Matrix in real life.pptx
Matrix in real life.pptxMatrix in real life.pptx
Matrix in real life.pptx
 
Analysis of Impact of Graph Theory in Computer Application
Analysis of Impact of Graph Theory in Computer ApplicationAnalysis of Impact of Graph Theory in Computer Application
Analysis of Impact of Graph Theory in Computer Application
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
 
11.secure compressed image transmission using self organizing feature maps
11.secure compressed image transmission using self organizing feature maps11.secure compressed image transmission using self organizing feature maps
11.secure compressed image transmission using self organizing feature maps
 
project ppt on anti counterfeiting technique for credit card transaction system
project ppt on anti counterfeiting technique for credit card transaction systemproject ppt on anti counterfeiting technique for credit card transaction system
project ppt on anti counterfeiting technique for credit card transaction system
 

Recently uploaded

18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptxPoojaSen20
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 

Recently uploaded (20)

18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 

Presentation on application of matrix

  • 1. Presentation On Application Of Matrix Prepared By: Prerana Bhattarai 139/13 BBA 2nd Semester ‘B’
  • 2.  Cryptography is the process of encrypting data so that third party can’t read it and privacy can be maintained.  It was started with the TV cable industries where even people who were not the customer could watch the TV programs  So, Videocipher encryption system was invented which would convert signals into digital form i.e. encrypt it, and the data were send over the satellite. The Videocipher box would decrypt the signal and those satellite dish owner who had Videocipher box would receive the decrypted signal i.e. the original signal before encryption.  In matrix same thing can be done. Application of Matrix
  • 3.  First, write a numerical value for each letter i.e. A=1, B=2, and Z=26, and space=27.  The data should be placed in matrix form i.e. in 2x1 or 3x1 matrix form.  The data should be multiplied by given encoding matrix.  Then, write the answer (value after multiplying) in linear form. How to encrypt data? Encryption Process
  • 4.  The encoding matrix be 1 0 −1 0 1 0 0 −1 1  Then, assign numeric value for “SUBMIT HER YOUR PLANS” i.e. S=19, U=21, B=2, M=13, I=9, T=20, space=27, H=8, E=5, R=18, space=27, Y=25, O=15, U=21, R=18, space=27, P=16, L=12, A=1, N=14, S=19 Example: Let take the message SUBMIT ME YOUR PLAN S U B M I T H E R Y O U R P L A N S 19 21 2 13 9 20 27 8 5 18 27 25 15 21 18 27 16 12 1 14 19
  • 5.  Since we are using a 3 by 3 matrix, we break the enumerated message above into a sequence of 3 by 1 vectors: [ ] [ ] [ ] [ ] [ ] [ ] [ ]19 21 2 13 9 20 18 27 25 27 8 5 15 21 18 1 14 19 27 16 12
  • 6.  The message should be encoded by multiplying the above 3x1 matrix by the given encoding matrix. 19 13 27 18 15 27 1 21 9 8 27 21 16 14 2 20 5 25 18 12 19 1 0 −1 0 1 0 0 −1 1 This gives, 17 -7 22 -7 -3 15 -18 21 9 8 27 21 16 14 -19 11 -3 -2 -3 -4 5
  • 7.  The columns of this matrix give the encoded message. The message is transmitted in the following linear form 17, 21, -21, -7, 9, -9, 22, 8, -8, -7, 27, -27, - 3, 21, -21, 15, 16, -16, -18, 14, -14
  • 8.  The encrypted number should be written in matrix form.  The inverse of the encoding matrix should be found.  Multiply the inverse encoding matrix, i.e. decoding matrix with the encrypted number.  Write the answer in linear form.  Assign 1=A, 2=B and so on and also 27=space. Decryption Process
  • 9.  The inverse of the encoding matrix should be taken out such as: 1 1 1 0 1 0 0 1 1
  • 10. Thus, to decode the message, perform the matrix multiplication and get the matrix 1 1 1 0 1 0 0 1 1 17 -7 22 -7 -3 15 -18 21 9 8 27 21 16 14 -19 11 -3 -2 -3 -4 5 19 13 27 18 15 27 1 21 9 8 27 21 16 14 2 20 5 25 18 12 19
  • 11.  The columns of this matrix, written in linear form, give the original message: S U B M I T H E R Y O U R P L A N S 19 21 2 13 9 20 27 8 5 18 27 25 15 21 18 27 16 12 1 14 19
  • 12.  Many geologists make use certain types of matrices for seismic surveys. The seismic survey is one form of geophysical survey that aims at measuring the earth’s (geo-) properties by means of physical (-physics) principles such as magnetic, electric, gravitational, thermal, and elastic theories. Seismic Surveys
  • 13.  Matrices are used to calculate gross domestic product in economics, and help in calculation for producing goods more efficiently. It is seen that through input- output analysis that is used in matrix a researcher can get information about what level of output should be of each industry at the existing technology. In economics
  • 14.
  • 15.  Matrix transforms are very useful within the world of computer graphics. Software and hardware graphics processor uses matrices for performing operations such as scaling, translation, reflection and rotation. Computer Animations
  • 16.  Matrices are very useful for organization, like for scientists who have to record the data from their experiments if it includes numbers.  In engineering, math reports are recorded using matrices.  And in architecture, matrices are used with computing. If needed, it will be very easy to add the data together, like with matrices in mathematics. Other uses…