SlideShare a Scribd company logo
1 of 17
Presentation On Application Of
Matrix
Prepared By:
Prerana Bhattarai
139/13
BBA 2nd Semester ‘B’
 Cryptography is the process of encrypting data so that third
party can’t read it and privacy can be maintained.
 It was started with the TV cable industries where even people
who were not the customer could watch the TV programs
 So, Videocipher encryption system was invented which would
convert signals into digital form i.e. encrypt it, and the data were
send over the satellite. The Videocipher box would decrypt the
signal and those satellite dish owner who had Videocipher box
would receive the decrypted signal i.e. the original signal before
encryption.
 In matrix same thing can be done.
Application of Matrix
 First, write a numerical value for each letter i.e. A=1,
B=2, and Z=26, and space=27.
 The data should be placed in matrix form i.e. in 2x1 or
3x1 matrix form.
 The data should be multiplied by given encoding
matrix.
 Then, write the answer (value after multiplying) in
linear form.
How to encrypt data?
Encryption Process
 The encoding matrix be
1 0 −1
0 1 0
0 −1 1
 Then, assign numeric value for “SUBMIT HER YOUR
PLANS” i.e. S=19, U=21, B=2, M=13, I=9, T=20,
space=27, H=8, E=5, R=18, space=27, Y=25, O=15, U=21,
R=18, space=27, P=16, L=12, A=1, N=14, S=19
Example: Let take the message
SUBMIT ME YOUR PLAN
S U B M I T H E R Y O U R P L A N S
19 21 2 13 9 20 27 8 5 18 27 25 15 21 18 27 16 12 1 14 19
 Since we are using a 3 by 3 matrix, we break the
enumerated message above into a sequence of 3 by 1
vectors:
[ ] [ ] [ ] [ ] [ ] [ ] [ ]19
21
2
13
9
20
18
27
25
27
8
5
15
21
18
1
14
19
27
16
12
 The message should be encoded by multiplying the above
3x1 matrix by the given encoding matrix.
19 13 27 18 15 27 1
21 9 8 27 21 16 14
2 20 5 25 18 12 19
1 0 −1
0 1 0
0 −1 1
This gives,
17 -7 22 -7 -3 15 -18
21 9 8 27 21 16 14
-19 11 -3 -2 -3 -4 5
 The columns of this matrix give the encoded message. The
message is transmitted in the following linear form
17, 21, -21, -7, 9, -9, 22, 8, -8, -7, 27, -27, -
3, 21, -21, 15, 16, -16, -18, 14, -14
 The encrypted number should be written in matrix
form.
 The inverse of the encoding matrix should be found.
 Multiply the inverse encoding matrix, i.e. decoding
matrix with the encrypted number.
 Write the answer in linear form.
 Assign 1=A, 2=B and so on and also 27=space.
Decryption Process
 The inverse of the encoding matrix should be taken
out such as:
1 1 1
0 1 0
0 1 1
Thus, to decode the message,
perform the matrix multiplication
and get the matrix
1 1 1
0 1 0
0 1 1
17 -7 22 -7 -3 15 -18
21 9 8 27 21 16 14
-19 11 -3 -2 -3 -4 5
19 13 27 18 15 27 1
21 9 8 27 21 16 14
2 20 5 25 18 12 19
 The columns of this matrix, written in linear form,
give the original message:
S U B M I T H E R Y O U R P L A N S
19 21 2 13 9 20 27 8 5 18 27 25 15 21 18 27 16 12 1 14 19
 Many geologists make use certain types of matrices
for seismic surveys. The seismic survey is one form of
geophysical survey that aims at measuring the earth’s
(geo-) properties by means of physical (-physics)
principles such as magnetic, electric, gravitational,
thermal, and elastic theories.
Seismic Surveys
 Matrices are used to calculate gross domestic product
in economics, and help in calculation for producing
goods more efficiently. It is seen that through input-
output analysis that is used in matrix a researcher can
get information about what level of output should be
of each industry at the existing technology.
In economics
 Matrix transforms are very useful within the world of
computer graphics. Software and hardware graphics
processor uses matrices for performing operations
such as scaling, translation, reflection and rotation.
Computer Animations
 Matrices are very useful for organization, like for
scientists who have to record the data from their
experiments if it includes numbers.
 In engineering, math reports are recorded using
matrices.
 And in architecture, matrices are used with
computing. If needed, it will be very easy to add the
data together, like with matrices in mathematics.
Other uses…
ANY QUESTIONS?

More Related Content

What's hot

Applications of matrices in Real\Daily life
Applications of matrices in Real\Daily lifeApplications of matrices in Real\Daily life
Applications of matrices in Real\Daily lifeSami Ullah
 
Applications of Matrices in Engineering
Applications of Matrices in EngineeringApplications of Matrices in Engineering
Applications of Matrices in EngineeringAliHasan358
 
Application of matrices in Daily life
Application of matrices in Daily lifeApplication of matrices in Daily life
Application of matrices in Daily lifeshubham mishra
 
Applications of Matrices
Applications of MatricesApplications of Matrices
Applications of Matricessanthosh kumar
 
Matrix and it's application
Matrix and it's application Matrix and it's application
Matrix and it's application MOHAMMAD AKASH
 
Application of Matrices in real life
Application of Matrices in real lifeApplication of Matrices in real life
Application of Matrices in real lifeShayshab Azad
 
Appilation of matrices in real life
Appilation of matrices in real lifeAppilation of matrices in real life
Appilation of matrices in real lifeStudent
 
Linear Algebra Applications
Linear Algebra ApplicationsLinear Algebra Applications
Linear Algebra ApplicationsRamesh Shashank
 
Application of Matrices on Cryptography
Application of Matrices on CryptographyApplication of Matrices on Cryptography
Application of Matrices on CryptographyRam Gupta
 
MATRICES AND ITS TYPE
MATRICES AND ITS TYPEMATRICES AND ITS TYPE
MATRICES AND ITS TYPEHimanshu Negi
 
Application of Matrix
Application of MatrixApplication of Matrix
Application of MatrixRahman Hillol
 
The History of Mathematics and Application of Matrices.pptx
The History of Mathematics and Application of Matrices.pptxThe History of Mathematics and Application of Matrices.pptx
The History of Mathematics and Application of Matrices.pptxSamjhauta Thapa
 
Application of linear algebra in cse
Application of linear algebra in cseApplication of linear algebra in cse
Application of linear algebra in cseArnob Khan
 
presentation on matrix
 presentation on matrix presentation on matrix
presentation on matrixNikhi Jain
 
Applications of linear algebra in computer science
Applications of linear algebra in computer scienceApplications of linear algebra in computer science
Applications of linear algebra in computer scienceArnob Khan
 
Engineering mathematics presentation
Engineering mathematics presentationEngineering mathematics presentation
Engineering mathematics presentationAfzal Hossen
 
Applications of linear algebra
Applications of linear algebraApplications of linear algebra
Applications of linear algebraPrerak Trivedi
 
cryptography Application of linear algebra
cryptography Application of linear algebra cryptography Application of linear algebra
cryptography Application of linear algebra Sami Ullah
 

What's hot (20)

Applications of matrices in Real\Daily life
Applications of matrices in Real\Daily lifeApplications of matrices in Real\Daily life
Applications of matrices in Real\Daily life
 
Applications of Matrices in Engineering
Applications of Matrices in EngineeringApplications of Matrices in Engineering
Applications of Matrices in Engineering
 
Application of matrices in Daily life
Application of matrices in Daily lifeApplication of matrices in Daily life
Application of matrices in Daily life
 
Applications of Matrices
Applications of MatricesApplications of Matrices
Applications of Matrices
 
Matrix and it's application
Matrix and it's application Matrix and it's application
Matrix and it's application
 
Application of Matrices in real life
Application of Matrices in real lifeApplication of Matrices in real life
Application of Matrices in real life
 
Appilation of matrices in real life
Appilation of matrices in real lifeAppilation of matrices in real life
Appilation of matrices in real life
 
Linear Algebra Applications
Linear Algebra ApplicationsLinear Algebra Applications
Linear Algebra Applications
 
Application of Matrices on Cryptography
Application of Matrices on CryptographyApplication of Matrices on Cryptography
Application of Matrices on Cryptography
 
Application of matrices in real life
Application of matrices in real lifeApplication of matrices in real life
Application of matrices in real life
 
MATRICES AND ITS TYPE
MATRICES AND ITS TYPEMATRICES AND ITS TYPE
MATRICES AND ITS TYPE
 
Application of Matrix
Application of MatrixApplication of Matrix
Application of Matrix
 
The History of Mathematics and Application of Matrices.pptx
The History of Mathematics and Application of Matrices.pptxThe History of Mathematics and Application of Matrices.pptx
The History of Mathematics and Application of Matrices.pptx
 
Application of linear algebra in cse
Application of linear algebra in cseApplication of linear algebra in cse
Application of linear algebra in cse
 
presentation on matrix
 presentation on matrix presentation on matrix
presentation on matrix
 
Applications of linear algebra in computer science
Applications of linear algebra in computer scienceApplications of linear algebra in computer science
Applications of linear algebra in computer science
 
Introduction of matrices
Introduction of matricesIntroduction of matrices
Introduction of matrices
 
Engineering mathematics presentation
Engineering mathematics presentationEngineering mathematics presentation
Engineering mathematics presentation
 
Applications of linear algebra
Applications of linear algebraApplications of linear algebra
Applications of linear algebra
 
cryptography Application of linear algebra
cryptography Application of linear algebra cryptography Application of linear algebra
cryptography Application of linear algebra
 

Viewers also liked

Introduction to MATrices LABoratory (MATLAB) as Part of Digital Signal Proces...
Introduction to MATrices LABoratory (MATLAB) as Part of Digital Signal Proces...Introduction to MATrices LABoratory (MATLAB) as Part of Digital Signal Proces...
Introduction to MATrices LABoratory (MATLAB) as Part of Digital Signal Proces...Ahmed Gad
 
Understanding Quadrilaterals
Understanding QuadrilateralsUnderstanding Quadrilaterals
Understanding QuadrilateralsSajeelK
 
MATRICES
MATRICESMATRICES
MATRICESfaijmsk
 
polynomials class 9th
polynomials class 9thpolynomials class 9th
polynomials class 9thastha11
 
Matrices and determinants
Matrices and determinantsMatrices and determinants
Matrices and determinantsoscar
 
Quadrilaterals
QuadrilateralsQuadrilaterals
QuadrilateralsHome
 
Mathsproject quadrilaterals
Mathsproject quadrilateralsMathsproject quadrilaterals
Mathsproject quadrilateralsshaunakk
 
Probability Overview
Probability OverviewProbability Overview
Probability Overviewmmeddin
 
Classifying Angles
Classifying AnglesClassifying Angles
Classifying Anglesdebrahanks
 
Basic Concept Of Probability
Basic Concept Of ProbabilityBasic Concept Of Probability
Basic Concept Of Probabilityguest45a926
 
Probability Powerpoint
Probability PowerpointProbability Powerpoint
Probability Powerpointspike2904
 
PROBABILITY
PROBABILITYPROBABILITY
PROBABILITYVIV13
 

Viewers also liked (19)

Introduction to MATrices LABoratory (MATLAB) as Part of Digital Signal Proces...
Introduction to MATrices LABoratory (MATLAB) as Part of Digital Signal Proces...Introduction to MATrices LABoratory (MATLAB) as Part of Digital Signal Proces...
Introduction to MATrices LABoratory (MATLAB) as Part of Digital Signal Proces...
 
Understanding Quadrilaterals
Understanding QuadrilateralsUnderstanding Quadrilaterals
Understanding Quadrilaterals
 
MATRICES
MATRICESMATRICES
MATRICES
 
polynomials class 9th
polynomials class 9thpolynomials class 9th
polynomials class 9th
 
Matrices and determinants
Matrices and determinantsMatrices and determinants
Matrices and determinants
 
Quadrilaterals
QuadrilateralsQuadrilaterals
Quadrilaterals
 
Angles ppt
Angles pptAngles ppt
Angles ppt
 
Mathsproject quadrilaterals
Mathsproject quadrilateralsMathsproject quadrilaterals
Mathsproject quadrilaterals
 
Triangles
TrianglesTriangles
Triangles
 
Triangles
TrianglesTriangles
Triangles
 
Probability Overview
Probability OverviewProbability Overview
Probability Overview
 
Classifying Angles
Classifying AnglesClassifying Angles
Classifying Angles
 
Triangle ppt
Triangle pptTriangle ppt
Triangle ppt
 
Lines and angles
Lines and anglesLines and angles
Lines and angles
 
Types of angles
Types of anglesTypes of angles
Types of angles
 
Basic Concept Of Probability
Basic Concept Of ProbabilityBasic Concept Of Probability
Basic Concept Of Probability
 
Probability Powerpoint
Probability PowerpointProbability Powerpoint
Probability Powerpoint
 
PROBABILITY
PROBABILITYPROBABILITY
PROBABILITY
 
Maths Project Power Point Presentation
Maths Project Power Point PresentationMaths Project Power Point Presentation
Maths Project Power Point Presentation
 

Similar to Presentation on application of matrix

IRJET-An Effective Strategy for Defense & Medical Pictures Security by Singul...
IRJET-An Effective Strategy for Defense & Medical Pictures Security by Singul...IRJET-An Effective Strategy for Defense & Medical Pictures Security by Singul...
IRJET-An Effective Strategy for Defense & Medical Pictures Security by Singul...IRJET Journal
 
BER ENHANCEMENT OF MIMO-CDMA BASED ON SPACE-TIME BLOCK CODES
BER ENHANCEMENT OF MIMO-CDMA BASED ON SPACE-TIME BLOCK CODESBER ENHANCEMENT OF MIMO-CDMA BASED ON SPACE-TIME BLOCK CODES
BER ENHANCEMENT OF MIMO-CDMA BASED ON SPACE-TIME BLOCK CODEScscpconf
 
Bivariatealgebraic integerencoded arai algorithm for
Bivariatealgebraic integerencoded arai algorithm forBivariatealgebraic integerencoded arai algorithm for
Bivariatealgebraic integerencoded arai algorithm foreSAT Publishing House
 
FPGA IMPLEMENTATION OF SOFT OUTPUT VITERBI ALGORITHM USING MEMORYLESS HYBRID ...
FPGA IMPLEMENTATION OF SOFT OUTPUT VITERBI ALGORITHM USING MEMORYLESS HYBRID ...FPGA IMPLEMENTATION OF SOFT OUTPUT VITERBI ALGORITHM USING MEMORYLESS HYBRID ...
FPGA IMPLEMENTATION OF SOFT OUTPUT VITERBI ALGORITHM USING MEMORYLESS HYBRID ...VLSICS Design
 
FPGA Implementation of Soft Output Viterbi Algorithm Using Memoryless Hybrid ...
FPGA Implementation of Soft Output Viterbi Algorithm Using Memoryless Hybrid ...FPGA Implementation of Soft Output Viterbi Algorithm Using Memoryless Hybrid ...
FPGA Implementation of Soft Output Viterbi Algorithm Using Memoryless Hybrid ...VLSICS Design
 
Ijarcet vol-2-issue-7-2223-2229
Ijarcet vol-2-issue-7-2223-2229Ijarcet vol-2-issue-7-2223-2229
Ijarcet vol-2-issue-7-2223-2229Editor IJARCET
 
Ijarcet vol-2-issue-7-2223-2229
Ijarcet vol-2-issue-7-2223-2229Ijarcet vol-2-issue-7-2223-2229
Ijarcet vol-2-issue-7-2223-2229Editor IJARCET
 
Matrix in real life.pptx
Matrix in real life.pptxMatrix in real life.pptx
Matrix in real life.pptxShahinSafana
 
Analysis of Impact of Graph Theory in Computer Application
Analysis of Impact of Graph Theory in Computer ApplicationAnalysis of Impact of Graph Theory in Computer Application
Analysis of Impact of Graph Theory in Computer ApplicationIRJET Journal
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSIJNSA Journal
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSIJNSA Journal
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSIJNSA Journal
 
11.secure compressed image transmission using self organizing feature maps
11.secure compressed image transmission using self organizing feature maps11.secure compressed image transmission using self organizing feature maps
11.secure compressed image transmission using self organizing feature mapsAlexander Decker
 
project ppt on anti counterfeiting technique for credit card transaction system
project ppt on anti counterfeiting technique for credit card transaction systemproject ppt on anti counterfeiting technique for credit card transaction system
project ppt on anti counterfeiting technique for credit card transaction systemRekha dudiya
 
IRJET- LS Chaotic based Image Encryption System Via Permutation Models
IRJET- LS Chaotic based Image Encryption System Via Permutation ModelsIRJET- LS Chaotic based Image Encryption System Via Permutation Models
IRJET- LS Chaotic based Image Encryption System Via Permutation ModelsIRJET Journal
 

Similar to Presentation on application of matrix (20)

Matrix
MatrixMatrix
Matrix
 
IRJET-An Effective Strategy for Defense & Medical Pictures Security by Singul...
IRJET-An Effective Strategy for Defense & Medical Pictures Security by Singul...IRJET-An Effective Strategy for Defense & Medical Pictures Security by Singul...
IRJET-An Effective Strategy for Defense & Medical Pictures Security by Singul...
 
Journal_ICACT
Journal_ICACTJournal_ICACT
Journal_ICACT
 
paper
paperpaper
paper
 
BER ENHANCEMENT OF MIMO-CDMA BASED ON SPACE-TIME BLOCK CODES
BER ENHANCEMENT OF MIMO-CDMA BASED ON SPACE-TIME BLOCK CODESBER ENHANCEMENT OF MIMO-CDMA BASED ON SPACE-TIME BLOCK CODES
BER ENHANCEMENT OF MIMO-CDMA BASED ON SPACE-TIME BLOCK CODES
 
Report
ReportReport
Report
 
Bivariatealgebraic integerencoded arai algorithm for
Bivariatealgebraic integerencoded arai algorithm forBivariatealgebraic integerencoded arai algorithm for
Bivariatealgebraic integerencoded arai algorithm for
 
FPGA IMPLEMENTATION OF SOFT OUTPUT VITERBI ALGORITHM USING MEMORYLESS HYBRID ...
FPGA IMPLEMENTATION OF SOFT OUTPUT VITERBI ALGORITHM USING MEMORYLESS HYBRID ...FPGA IMPLEMENTATION OF SOFT OUTPUT VITERBI ALGORITHM USING MEMORYLESS HYBRID ...
FPGA IMPLEMENTATION OF SOFT OUTPUT VITERBI ALGORITHM USING MEMORYLESS HYBRID ...
 
FPGA Implementation of Soft Output Viterbi Algorithm Using Memoryless Hybrid ...
FPGA Implementation of Soft Output Viterbi Algorithm Using Memoryless Hybrid ...FPGA Implementation of Soft Output Viterbi Algorithm Using Memoryless Hybrid ...
FPGA Implementation of Soft Output Viterbi Algorithm Using Memoryless Hybrid ...
 
E04612529
E04612529E04612529
E04612529
 
Ijarcet vol-2-issue-7-2223-2229
Ijarcet vol-2-issue-7-2223-2229Ijarcet vol-2-issue-7-2223-2229
Ijarcet vol-2-issue-7-2223-2229
 
Ijarcet vol-2-issue-7-2223-2229
Ijarcet vol-2-issue-7-2223-2229Ijarcet vol-2-issue-7-2223-2229
Ijarcet vol-2-issue-7-2223-2229
 
Matrix in real life.pptx
Matrix in real life.pptxMatrix in real life.pptx
Matrix in real life.pptx
 
Analysis of Impact of Graph Theory in Computer Application
Analysis of Impact of Graph Theory in Computer ApplicationAnalysis of Impact of Graph Theory in Computer Application
Analysis of Impact of Graph Theory in Computer Application
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
 
11.secure compressed image transmission using self organizing feature maps
11.secure compressed image transmission using self organizing feature maps11.secure compressed image transmission using self organizing feature maps
11.secure compressed image transmission using self organizing feature maps
 
project ppt on anti counterfeiting technique for credit card transaction system
project ppt on anti counterfeiting technique for credit card transaction systemproject ppt on anti counterfeiting technique for credit card transaction system
project ppt on anti counterfeiting technique for credit card transaction system
 
IRJET- LS Chaotic based Image Encryption System Via Permutation Models
IRJET- LS Chaotic based Image Encryption System Via Permutation ModelsIRJET- LS Chaotic based Image Encryption System Via Permutation Models
IRJET- LS Chaotic based Image Encryption System Via Permutation Models
 

Recently uploaded

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 

Recently uploaded (20)

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 

Presentation on application of matrix

  • 1. Presentation On Application Of Matrix Prepared By: Prerana Bhattarai 139/13 BBA 2nd Semester ‘B’
  • 2.  Cryptography is the process of encrypting data so that third party can’t read it and privacy can be maintained.  It was started with the TV cable industries where even people who were not the customer could watch the TV programs  So, Videocipher encryption system was invented which would convert signals into digital form i.e. encrypt it, and the data were send over the satellite. The Videocipher box would decrypt the signal and those satellite dish owner who had Videocipher box would receive the decrypted signal i.e. the original signal before encryption.  In matrix same thing can be done. Application of Matrix
  • 3.  First, write a numerical value for each letter i.e. A=1, B=2, and Z=26, and space=27.  The data should be placed in matrix form i.e. in 2x1 or 3x1 matrix form.  The data should be multiplied by given encoding matrix.  Then, write the answer (value after multiplying) in linear form. How to encrypt data? Encryption Process
  • 4.  The encoding matrix be 1 0 −1 0 1 0 0 −1 1  Then, assign numeric value for “SUBMIT HER YOUR PLANS” i.e. S=19, U=21, B=2, M=13, I=9, T=20, space=27, H=8, E=5, R=18, space=27, Y=25, O=15, U=21, R=18, space=27, P=16, L=12, A=1, N=14, S=19 Example: Let take the message SUBMIT ME YOUR PLAN S U B M I T H E R Y O U R P L A N S 19 21 2 13 9 20 27 8 5 18 27 25 15 21 18 27 16 12 1 14 19
  • 5.  Since we are using a 3 by 3 matrix, we break the enumerated message above into a sequence of 3 by 1 vectors: [ ] [ ] [ ] [ ] [ ] [ ] [ ]19 21 2 13 9 20 18 27 25 27 8 5 15 21 18 1 14 19 27 16 12
  • 6.  The message should be encoded by multiplying the above 3x1 matrix by the given encoding matrix. 19 13 27 18 15 27 1 21 9 8 27 21 16 14 2 20 5 25 18 12 19 1 0 −1 0 1 0 0 −1 1 This gives, 17 -7 22 -7 -3 15 -18 21 9 8 27 21 16 14 -19 11 -3 -2 -3 -4 5
  • 7.  The columns of this matrix give the encoded message. The message is transmitted in the following linear form 17, 21, -21, -7, 9, -9, 22, 8, -8, -7, 27, -27, - 3, 21, -21, 15, 16, -16, -18, 14, -14
  • 8.  The encrypted number should be written in matrix form.  The inverse of the encoding matrix should be found.  Multiply the inverse encoding matrix, i.e. decoding matrix with the encrypted number.  Write the answer in linear form.  Assign 1=A, 2=B and so on and also 27=space. Decryption Process
  • 9.  The inverse of the encoding matrix should be taken out such as: 1 1 1 0 1 0 0 1 1
  • 10. Thus, to decode the message, perform the matrix multiplication and get the matrix 1 1 1 0 1 0 0 1 1 17 -7 22 -7 -3 15 -18 21 9 8 27 21 16 14 -19 11 -3 -2 -3 -4 5 19 13 27 18 15 27 1 21 9 8 27 21 16 14 2 20 5 25 18 12 19
  • 11.  The columns of this matrix, written in linear form, give the original message: S U B M I T H E R Y O U R P L A N S 19 21 2 13 9 20 27 8 5 18 27 25 15 21 18 27 16 12 1 14 19
  • 12.  Many geologists make use certain types of matrices for seismic surveys. The seismic survey is one form of geophysical survey that aims at measuring the earth’s (geo-) properties by means of physical (-physics) principles such as magnetic, electric, gravitational, thermal, and elastic theories. Seismic Surveys
  • 13.  Matrices are used to calculate gross domestic product in economics, and help in calculation for producing goods more efficiently. It is seen that through input- output analysis that is used in matrix a researcher can get information about what level of output should be of each industry at the existing technology. In economics
  • 14.
  • 15.  Matrix transforms are very useful within the world of computer graphics. Software and hardware graphics processor uses matrices for performing operations such as scaling, translation, reflection and rotation. Computer Animations
  • 16.  Matrices are very useful for organization, like for scientists who have to record the data from their experiments if it includes numbers.  In engineering, math reports are recorded using matrices.  And in architecture, matrices are used with computing. If needed, it will be very easy to add the data together, like with matrices in mathematics. Other uses…