SlideShare a Scribd company logo
1 of 1
Denzel Akosa
Professor Lauve
Mathematics
08-07-14
A matrix is a function whose inverse (when it exists) can be obtained by creating a system of
equations and solving for them using unknowns. Two classical methods of finding the inverse
creates a system of linear equations (in each, an nxn matrix corresponds to a system of n^2
equations and unknowns). We ask the question first posed by famous mathematician and
computer scientist Schutzenberger over twenty years ago: from the 2n^2 equations, which
choices of n^2 equations yield the (unique) solution for the inverse function? As the size of the
matrix increases from 2x2 to 4x4 and so on, solving for the matrix inverse by hand becomes
intractable. We use the computer programming language Sage to perform Gaussian elimination
on the various choices of systems of equations, for various matrix sizes. The secondary goal of
this project is to look for patterns explaining why any given choice of equations yields a valid
solution or not.
Possible applications are to cryptography. E.g., data may be encoded in the matrix or its inverse,
and it is “encrypted” because the eavesdropper does not know which choice of n^2 equations
was passed from the sender to the receiver.

More Related Content

What's hot

Paper id 21201483
Paper id 21201483Paper id 21201483
Paper id 21201483IJRAT
 
3D epistemologies vs 3D software
3D epistemologies vs 3D software3D epistemologies vs 3D software
3D epistemologies vs 3D softwareAshley M. Richter
 
Coeffects: A Calculus of Context-Dependent Computation
Coeffects: A Calculus of Context-Dependent ComputationCoeffects: A Calculus of Context-Dependent Computation
Coeffects: A Calculus of Context-Dependent ComputationTomas Petricek
 
APLICACIONES DE ESPACIO VECTORIALES
APLICACIONES DE ESPACIO VECTORIALESAPLICACIONES DE ESPACIO VECTORIALES
APLICACIONES DE ESPACIO VECTORIALESJoseLuisCastroGualot
 
CASCADE BLOCK CIPHER USING BRAIDING/ENTANGLEMENT OF SPIN MATRICES AND BIT ROT...
CASCADE BLOCK CIPHER USING BRAIDING/ENTANGLEMENT OF SPIN MATRICES AND BIT ROT...CASCADE BLOCK CIPHER USING BRAIDING/ENTANGLEMENT OF SPIN MATRICES AND BIT ROT...
CASCADE BLOCK CIPHER USING BRAIDING/ENTANGLEMENT OF SPIN MATRICES AND BIT ROT...IJNSA Journal
 
L4 cluster analysis NWU 4.3 Graphics Course
L4 cluster analysis NWU 4.3 Graphics CourseL4 cluster analysis NWU 4.3 Graphics Course
L4 cluster analysis NWU 4.3 Graphics CourseMohaiminur Rahman
 

What's hot (11)

Starting work with R
Starting work with RStarting work with R
Starting work with R
 
Paper id 21201483
Paper id 21201483Paper id 21201483
Paper id 21201483
 
3D epistemologies vs 3D software
3D epistemologies vs 3D software3D epistemologies vs 3D software
3D epistemologies vs 3D software
 
Coeffects: A Calculus of Context-Dependent Computation
Coeffects: A Calculus of Context-Dependent ComputationCoeffects: A Calculus of Context-Dependent Computation
Coeffects: A Calculus of Context-Dependent Computation
 
Pca part
Pca partPca part
Pca part
 
APLICACIONES DE ESPACIO VECTORIALES
APLICACIONES DE ESPACIO VECTORIALESAPLICACIONES DE ESPACIO VECTORIALES
APLICACIONES DE ESPACIO VECTORIALES
 
Application of Matrices
Application of MatricesApplication of Matrices
Application of Matrices
 
2. tensor algebra jan 2013
2. tensor algebra jan 20132. tensor algebra jan 2013
2. tensor algebra jan 2013
 
CASCADE BLOCK CIPHER USING BRAIDING/ENTANGLEMENT OF SPIN MATRICES AND BIT ROT...
CASCADE BLOCK CIPHER USING BRAIDING/ENTANGLEMENT OF SPIN MATRICES AND BIT ROT...CASCADE BLOCK CIPHER USING BRAIDING/ENTANGLEMENT OF SPIN MATRICES AND BIT ROT...
CASCADE BLOCK CIPHER USING BRAIDING/ENTANGLEMENT OF SPIN MATRICES AND BIT ROT...
 
Taller2 parcial2 grupo_4_
Taller2 parcial2 grupo_4_Taller2 parcial2 grupo_4_
Taller2 parcial2 grupo_4_
 
L4 cluster analysis NWU 4.3 Graphics Course
L4 cluster analysis NWU 4.3 Graphics CourseL4 cluster analysis NWU 4.3 Graphics Course
L4 cluster analysis NWU 4.3 Graphics Course
 

Viewers also liked

Viewers also liked (9)

Ventanas xampp
Ventanas xamppVentanas xampp
Ventanas xampp
 
Diario (carlos1)
Diario (carlos1)Diario (carlos1)
Diario (carlos1)
 
Sessão 2
Sessão 2Sessão 2
Sessão 2
 
Palestra inovação dell
Palestra inovação dellPalestra inovação dell
Palestra inovação dell
 
Internet Segura
Internet SeguraInternet Segura
Internet Segura
 
Aterramento1
Aterramento1Aterramento1
Aterramento1
 
Meu Filho
Meu FilhoMeu Filho
Meu Filho
 
Ação de sensibilização animal
Ação de sensibilização animal Ação de sensibilização animal
Ação de sensibilização animal
 
Nosso Corpo e Nossos Sentimentos
Nosso Corpo e Nossos SentimentosNosso Corpo e Nossos Sentimentos
Nosso Corpo e Nossos Sentimentos
 

Similar to ReapAbstractbyDenzelakosa

To the numerical modeling of self similar solutions of
To the numerical modeling of self similar solutions ofTo the numerical modeling of self similar solutions of
To the numerical modeling of self similar solutions ofeSAT Publishing House
 
Nonequilibrium Network Dynamics_Inference, Fluctuation-Respones & Tipping Poi...
Nonequilibrium Network Dynamics_Inference, Fluctuation-Respones & Tipping Poi...Nonequilibrium Network Dynamics_Inference, Fluctuation-Respones & Tipping Poi...
Nonequilibrium Network Dynamics_Inference, Fluctuation-Respones & Tipping Poi...Förderverein Technische Fakultät
 
Comparative Study of the Effect of Different Collocation Points on Legendre-C...
Comparative Study of the Effect of Different Collocation Points on Legendre-C...Comparative Study of the Effect of Different Collocation Points on Legendre-C...
Comparative Study of the Effect of Different Collocation Points on Legendre-C...IOSR Journals
 
Paper id 24201464
Paper id 24201464Paper id 24201464
Paper id 24201464IJRAT
 
ALTERNATIVE METHOD TO LINEAR CONGRUENCE
ALTERNATIVE METHOD TO LINEAR CONGRUENCEALTERNATIVE METHOD TO LINEAR CONGRUENCE
ALTERNATIVE METHOD TO LINEAR CONGRUENCEPolemer Cuarto
 
A Condensation-Projection Method For The Generalized Eigenvalue Problem
A Condensation-Projection Method For The Generalized Eigenvalue ProblemA Condensation-Projection Method For The Generalized Eigenvalue Problem
A Condensation-Projection Method For The Generalized Eigenvalue ProblemScott Donald
 
CHN and Swap Heuristic to Solve the Maximum Independent Set Problem
CHN and Swap Heuristic to Solve the Maximum Independent Set ProblemCHN and Swap Heuristic to Solve the Maximum Independent Set Problem
CHN and Swap Heuristic to Solve the Maximum Independent Set ProblemIJECEIAES
 
Be2419772016
Be2419772016Be2419772016
Be2419772016IJMER
 
The Sample Average Approximation Method for Stochastic Programs with Integer ...
The Sample Average Approximation Method for Stochastic Programs with Integer ...The Sample Average Approximation Method for Stochastic Programs with Integer ...
The Sample Average Approximation Method for Stochastic Programs with Integer ...SSA KPI
 
Optimising Data Using K-Means Clustering Algorithm
Optimising Data Using K-Means Clustering AlgorithmOptimising Data Using K-Means Clustering Algorithm
Optimising Data Using K-Means Clustering AlgorithmIJERA Editor
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)theijes
 
Robust Fuzzy Data Clustering In An Ordinal Scale Based On A Similarity Measure
Robust Fuzzy Data Clustering In An Ordinal Scale Based On A Similarity MeasureRobust Fuzzy Data Clustering In An Ordinal Scale Based On A Similarity Measure
Robust Fuzzy Data Clustering In An Ordinal Scale Based On A Similarity MeasureIJRES Journal
 
report2.doc
report2.docreport2.doc
report2.docbutest
 
Anomaly detection using deep one class classifier
Anomaly detection using deep one class classifierAnomaly detection using deep one class classifier
Anomaly detection using deep one class classifier홍배 김
 

Similar to ReapAbstractbyDenzelakosa (20)

To the numerical modeling of self similar solutions of
To the numerical modeling of self similar solutions ofTo the numerical modeling of self similar solutions of
To the numerical modeling of self similar solutions of
 
Linear algebra havard university
Linear algebra havard universityLinear algebra havard university
Linear algebra havard university
 
Nonequilibrium Network Dynamics_Inference, Fluctuation-Respones & Tipping Poi...
Nonequilibrium Network Dynamics_Inference, Fluctuation-Respones & Tipping Poi...Nonequilibrium Network Dynamics_Inference, Fluctuation-Respones & Tipping Poi...
Nonequilibrium Network Dynamics_Inference, Fluctuation-Respones & Tipping Poi...
 
Comparative Study of the Effect of Different Collocation Points on Legendre-C...
Comparative Study of the Effect of Different Collocation Points on Legendre-C...Comparative Study of the Effect of Different Collocation Points on Legendre-C...
Comparative Study of the Effect of Different Collocation Points on Legendre-C...
 
Paper id 24201464
Paper id 24201464Paper id 24201464
Paper id 24201464
 
ALTERNATIVE METHOD TO LINEAR CONGRUENCE
ALTERNATIVE METHOD TO LINEAR CONGRUENCEALTERNATIVE METHOD TO LINEAR CONGRUENCE
ALTERNATIVE METHOD TO LINEAR CONGRUENCE
 
A Condensation-Projection Method For The Generalized Eigenvalue Problem
A Condensation-Projection Method For The Generalized Eigenvalue ProblemA Condensation-Projection Method For The Generalized Eigenvalue Problem
A Condensation-Projection Method For The Generalized Eigenvalue Problem
 
CHN and Swap Heuristic to Solve the Maximum Independent Set Problem
CHN and Swap Heuristic to Solve the Maximum Independent Set ProblemCHN and Swap Heuristic to Solve the Maximum Independent Set Problem
CHN and Swap Heuristic to Solve the Maximum Independent Set Problem
 
Be2419772016
Be2419772016Be2419772016
Be2419772016
 
MCCS
MCCSMCCS
MCCS
 
The Sample Average Approximation Method for Stochastic Programs with Integer ...
The Sample Average Approximation Method for Stochastic Programs with Integer ...The Sample Average Approximation Method for Stochastic Programs with Integer ...
The Sample Average Approximation Method for Stochastic Programs with Integer ...
 
Unit 2
Unit 2Unit 2
Unit 2
 
Optimising Data Using K-Means Clustering Algorithm
Optimising Data Using K-Means Clustering AlgorithmOptimising Data Using K-Means Clustering Algorithm
Optimising Data Using K-Means Clustering Algorithm
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 
Modeling the dynamics of molecular concentration during the diffusion procedure
Modeling the dynamics of molecular concentration during the  diffusion procedureModeling the dynamics of molecular concentration during the  diffusion procedure
Modeling the dynamics of molecular concentration during the diffusion procedure
 
Planted Clique Research Paper
Planted Clique Research PaperPlanted Clique Research Paper
Planted Clique Research Paper
 
Robust Fuzzy Data Clustering In An Ordinal Scale Based On A Similarity Measure
Robust Fuzzy Data Clustering In An Ordinal Scale Based On A Similarity MeasureRobust Fuzzy Data Clustering In An Ordinal Scale Based On A Similarity Measure
Robust Fuzzy Data Clustering In An Ordinal Scale Based On A Similarity Measure
 
report2.doc
report2.docreport2.doc
report2.doc
 
N41049093
N41049093N41049093
N41049093
 
Anomaly detection using deep one class classifier
Anomaly detection using deep one class classifierAnomaly detection using deep one class classifier
Anomaly detection using deep one class classifier
 

ReapAbstractbyDenzelakosa

  • 1. Denzel Akosa Professor Lauve Mathematics 08-07-14 A matrix is a function whose inverse (when it exists) can be obtained by creating a system of equations and solving for them using unknowns. Two classical methods of finding the inverse creates a system of linear equations (in each, an nxn matrix corresponds to a system of n^2 equations and unknowns). We ask the question first posed by famous mathematician and computer scientist Schutzenberger over twenty years ago: from the 2n^2 equations, which choices of n^2 equations yield the (unique) solution for the inverse function? As the size of the matrix increases from 2x2 to 4x4 and so on, solving for the matrix inverse by hand becomes intractable. We use the computer programming language Sage to perform Gaussian elimination on the various choices of systems of equations, for various matrix sizes. The secondary goal of this project is to look for patterns explaining why any given choice of equations yields a valid solution or not. Possible applications are to cryptography. E.g., data may be encoded in the matrix or its inverse, and it is “encrypted” because the eavesdropper does not know which choice of n^2 equations was passed from the sender to the receiver.