Download as pdf or txt
Download as pdf or txt
You are on page 1of 14

In Real Life

Presented By
Sandeep Kumar 2K2O/B17/17
Piyush Goenka 2K20/B17/09
Matrices
 A matrix is a rectangular array of
integers organized in columns and
rows. The numbers are known as the
matrix's entries or elements. Matrixes
are used in a variety of fields,
including engineering, physics,
economics, and statistics, as well as
many branches of mathematics.

Application of Matrices
 Theoretical graph theory
A finite graph's adjacency matrix is a fundamental
concept in graph theory.
 Computer Graphics
In computer graphics, 444 transformation rotation
matrices are often employed.
 Linear equations and theirsolutions
 Making use of row reduction
 The Cramer Rule (Determinates)
 Making use of the inverse matrix
 MATRICES IN REAL LIFE
Matrixes are used for the study of, quantum mechanics,
electrical circuits and optics, among other physics-related
applications. Matrices and inverse matrices are used by
programmers to code or encrypt contents that are made
up of a series of binary formats and are solved using
code theory.
 IN DIMENSIONAL WORK
Matrixes are used in several computer-based
applications to present a 3-dimensional picture into a 2-
dimensional screen, resulting in real looking motions.
 IN GOOGLE SEARCH
In the page rank algorithms that are employed in the
ranking of pages on Google, stochastic matrices and
Eigen vector solver are used
Seismic surveys

For seismic surveys, several geologists utilize specific sorts of


matrices. Seismic survey is a type of geophysical survey that
uses physical principles such as electrical, thermal, and
elasticity theories to measure the earth's geological
characteristics.
Application of matrix in
cryptography
 One form of code, which is exceedingly
tough to crack, uses a huge matrix to
encrypt a content so that it cannot be read
by a third party and privacy is preserved.
 The content is decrypted by the receiver
applying the inverse of the matrix.
 The sender's encrypted matrix is called the
encoding matrices, while the receiver's
decrypting matrices is called the decrypting
matrices.
How to encrypt data?
Encryption Process
Let content to be decrypted:
PREPARED FOR NEGOTIATION
And the encrypted matrix be
-3 -3 -4
0 1 1
4 3 4

Each letter of the alphabet is given a number For example, let A


is 2, B is 1, and so on. We also use some number to recognize
the space in between two words. The content therefore
becomes:

P R E P A R ED * FOR * N E G O T I A T ION
16 18 5 16 1 18 5 27 20 15 27 14 5 7 15 20 9 1 20 5
-3 -3 -4 16 16 5 15 5 20 20
0 1 1 18 1 27 27 7 9 5
4 3 4 5 18 20 14 15 1 27

• we get
-122 -123 -176 -182 -96 -91 -183
23 19 47 41 22 10 32
138 139 181 197 101 111 203

• The columns of this matrices give the encrypted content.

• Encryption is done
Conversion
 The content is converted in a linear form

-122 -123 -176 -182 -96 -91 -183


23 19 47 41 22 10 32
138 139 181 196 101 111 203
1 0 1
4 4 3
-4 -3 -3

1 0 1 -122 -123 -176 -182 -96 -91 -183


4 4 3 23 19 47 41 22 10 32
-4 -3 -3 138 139 181 197 101 111 203
Decrypted content
 The columns of the given matrix, in linear
form, gives the original content

16 18 5 16 1 18 5 27 20 15 27 14 5 7 15 20 9 1 20 5
P R E P A R ED * F OR * N E G O T I A T ION

content received:
Prepared for Negotiation
Thank you !

You might also like