SHIVANGI RATHORE .SUBMITTED BY.

DEFINITIONS  Matrix Matrix is defined as a rectangular array of numbers A table of number or set of number The numbers inside the matrix is called elements or entries. .

UNIT MATRIX 7. RECTANGULAR MATRIX 2. ROW AND COLUMN MATRIX 4. SCALAR MATRIX 6. DIAGONAL MATRIX 5. SQUARE MATRIX 3. ZERO MATRIX .TYPES OF MATRICES 1 .

and 4x2 respectively A special kind of matrix is a square matrix . 2x3. 3x1.e. we say that the matrix has order n. If a square matrix has n rows and n columns. a matrix with the same number of rows and columns. The matrix is a square matrix of order 3. m is the number of column of the matrix. where. the following matrices are of dimensions 1x4.    i.   n is the number of rows of the matrix. of the matrix is n x m. For example. .SIZE AND DIMENSION OF MATRIX The size. or dimension.

B.bij  Multiplication: Z = A*B. zij = aij + bij  Substraction: Z = A . zij = aij . aim* bnj .. if # columns in A = # rows in B.. zij = ai1* b1j + ai2* b2j + ai3* b3j + .OPERATIONS IN MATRICES  Addition: Z = A + B.

Using Row reduction Cramer&apos.s Rule ( Determinants) Using the inverse matrix Linear combinations of quantum states in Physics  Computer graphics  Solving linear equations    .Application of Matrices Graph theory  The adjacency matrix of a finite graph is a basic notion of graph theory. 4×4 transformation rotation matrices are commonly used in computer graphics.s operators by infinite-dimensional matrices acting on quantum states. The first model of quantum mechanics by Heisenberg in 1925 represented the theory&apos. This is also referred to as matrix mechanics .

even those who can see the encrypted data.  Cryptography mainly consists of Encryption and Decryption  Encryption is the transformation of data into some unreadable form.CRYPTOGRAPHY  Cryptography. is concerned with keeping communications private. the keys used for encryption and decryption might be different. the same key might be used for both encryption and decryption. Its purpose is to ensure privacy by keeping the information hidden from anyone for whom it is not intended.  Depending on the encryption mechanism used.  .  Encryption and Decryption require the use of some secret information. usually referred to as a key.  Decryption is the reverse of encryption  It is the transformation of encrypted data back into some intelligible form. while for other mechanisms.

 • The encryption matrix MUST be invertible. • [MESSAGE] x [ENCRYPTION MATRIX] = [CODE]  • [DECRYPTION MATRIX] x [CODE] = [MESSAGE]  • Order of Encryption/Decryption Matrix must match  the length of message chunks and code (message chunk  length = number of entries in any column or row. otherwise  you cannot decode the message you encoded .

 TIME MANAGEMENT MATRIX: THE 4 QUADRANTS  Our daily activities can be broken down into 4 quadrants. by urgency and importance: .

strategy involves connectivity. between supply and demand. between recurrent and non-recurrent client needs for services. Seeing and understanding the complex relationships between lawyers and clients. between value and client loyalty. between referral sources and end-consumers  BUSINESS ORGANIZATIONS: TOWS AND SWOT. .OTHER APPLICATIONS OF MATRICES  ECONOMICS: Checking  VIDEO SCREEN  DIGITAL PHOTOGRAPHY  MARKETING :marketing out the production level of firm keeping various factors in concern.

THANK YOU .

Sign up to vote on this title
UsefulNot useful