Professional Documents
Culture Documents
Linear
Linear
I. Computer Graphics:
Example:
u u 1 0 u1 u1
L : R2 → R2 , L 1 = A 1 = = .
u2 u2 0 −1u2 − u2
For example, the reflection for the triangle with vertices (− 1, 4 ), (3, 1), (2, 6 ) is
− 1 − 1 3 3 2 2
L = , L = , L = .
4 − 4 1 − 1 6 − 6
The plot is given below.
(2, 6)
(− 1, 4)
(3, 1)
(3, − 1)
(− 1, − 4)
(2, − 6)
1
u1 u1 0 −1u1 − u2
L : R → R , L = A =
2 2
u = − u .
u u
2 2 − 1 0 2 1
Thus, the reflection for the triangle with vertices (− 1, 4 ), (3, 1), (2, 6 ) is
− 1 − 4 3 − 1 2 − 6
L = , L = , L = .
4 1 1 − 3 6 − 2
(2, 6)
(− 1, 4)
(3, 1)
(− 4, 1)
(− 1, − 3)
(− 6, − 2)
3. Rotation:
cos π
A= 2
( ) ( 2 ) = 0
− sin π − 1
π
sin 2 ( ) cos (π ) 1
2
0 .
Thus, the rotation for the triangle with vertices (0, 0 ), (1, 0 ), (1, 1) is
2
0 0 − 1 0 0
L = 0 = 0 , .
0
1 0
1 0 − 1 1 0
L = 0 = 1 ,
0 1 0
and
1 0 − 1 1 − 1
L = 1 = 1 .
1 1 0
The plot is given below.
(0, 1)
(1, 1)
(− 1, 1)
(0, 0) (1, 0)
u u + 2u2
L 1 = 1
u
2 2 u
Thus, the shear for the rectangle with vertices (0, 0 ), (0, 2 ), (4, 0 ), (4, 2 ) in the
x-direction is
0 0 0 4 4 4 4 8
L = , L = , L = , L = .
0 0 2 2 0 0 2 2
3
The plot is given below.
(4, 2) (8, 2)
(0, 2)
(0, 0) (4, 0)
II. Cryptography:
MEET TOMORROW.
For the security, we first code the alphabet as follows:
A B … X Y Z
1 2 … 24 25 26
The sequence
13 5 5 20 20 15 13 15 18 18 15 23
is the original code message. To encrypt the original code message, we can apply a
linear transformation to original code message. Let
L : R 3 → R 3 , L(x ) = Ax,
where
4
1 2 3
A = 1 1 2 .
0 1 2
Then, we break the original message into 4 vectors first,
Suppose our friend wants to encode the encrypted message code. Our friend can find
the inverse matrix of A first,
5
−1
1 2 3 0 1 − 1
A−1 = 1 1 2 = 2 − 2 − 1
0 1 2 − 1 1 1
and then
38 0 1 − 1 38 13
A−1 28 = 2 − 2 − 1 28 = 5 ,
15 − 1 1 1 15 5
1 2 3
L : R3 → R3 , L( x ) = Ax = 1 1 2 x.
0 1 2
6
Thus, we first break the message into 5 vectors,