Professional Documents
Culture Documents
Sec9 6
Sec9 6
I. Computer Graphics:
Example:
2, 6
1, 4
3, 1
3, 1
1, 4
2, 6
1
1 4 3 1 2 6
L , L , L .
4 1 1 3 6 2
2, 6
1, 4
3, 1
4, 1
1, 3
6, 2
3. Rotation:
u u cos sin u1
L : R 2 R 2 , L 1 A 1
u2 u2 sin cos u2
For example, as ,
2
A
cos sin 0 1
2 2
sin 2 cos 2
1 0 .
Thus, the rotation for the triangle with vertices 0, 0 , 1, 0 , 1, 1 is
0 0 1 0 0
L , .
0 1 0 0 0
1 0 1 1 0
L ,
0 1 0 0 1
and
1 0 1 1 1
L 1 .
1 0 1 1
2
The plot is given below.
0, 1 1, 1
1, 1
0, 0 1, 0
u u 2u2
L 1 1
u2 u2
Thus, the shear for the rectangle with vertices 0, 0 , 0, 2 , 4, 0 , 4, 2 in the x-
direction is
0 0 0 4 4 4 4 8
L , L , L , L .
0 0 2 2 0 0 2 2
The plot is given below.
3
4, 2 8, 2
0, 2
0, 0 4, 0
II. Cryptography:
The sequence
13 5 5 20 20 15 13 15 18 18 15 23
is the original code message. To encrypt the original code message, we can apply a
linear transformation to original code message. Let
L : R 3 R 3 , L x Ax,
where
1 2 3
A 1 1 2 .
0 1 2
4
13 20 13 18
5 , 20, 15 , 15
,
5 15 18 23
and use the linear transformation to obtain the encrypted code message
13 13 1 2 3 13 38
L 5 A 5 1 1 2 5 28 ,
5
5 0 1 2 5 15
Suppose our friend wants to encode the encrypted message code. Our friend can find
the inverse matrix of A first,
1
1 2 3 0 1 1
A 1
1 1 2 2 2 1
0 1 2 1 1 1
and then
38 0 1 1 38 13
A 28 2
1
2 1 28 5 ,
15 1 1 1 15 5
and
5
117 0 1 1 117 18
A 79 2
1
2 1 79 15
61 1 1 1 61 23
76 0 1 1 76 8
A 48 2
1
2 1 48 16 ,
40 1 1 1 40 12
and
86 0 1 1 86 1
A 53 2
1
2 1 53 14 .
52 1 1 1 52 19
6
P H O T O G R A P H P L A N S
PHOTOGRAPH PLANS