SlideShare a Scribd company logo
TOPIC – 1) FINDING VALUE OF PIE
2) PYTHAGORAS
THEOREM
3) CRYPTOGRAPHY
DR. S&S.S GANDHY GOVERMENT ENGINEERING
COLLAGE
PREPARED BY
CHELANI PRASHANT
VADHER VIJAY
PATIL NIKHIL
1] FINDING VALUE OF PIE
 INFORMATION ABOUT PIE
 NAME
 DEFINITION
 APPROXCIMATE VALUE
 ACTIVITY TO FIND PIE
INFORMATION ABOUT PIE
 The number π is a mathematical constant, the
ratio of a circle's circumference to its diameter,
commonly approximated as 3.14159. It has been
represented by the Greek letter "π" since the mid-
18th century, though it is also sometimes spelled
out as "pi“.
 Being an irrational number, π cannot be
expressed exactly as a fraction. Still, fractions
such as 22/7 and other rational numbers are
commonly used to approximate π.
 Because its definition relates to the circle, π is
found in many formulae in trigonometry and
geometry, especially those concerning circles,
ellipses or spheres
NAME
 The symbol used by mathematicians to represent
the ratio of a circle's circumference to its diameter
is the lowercase Greek letter π, sometimes
spelled out as pi, and derived from the first letter
of the Greek word perimetros, meaning
circumference. In English, π is pronounced as
"pie“. In mathematical use, the lowercase letter π
(or π in sans-serif font) is distinguished from its
capital counterpart Π, which denotes a product of
a sequence.
 The choice of the symbol π is discussed in the
section Adoption of the symbol π.
DEFINITION
 π is commonly defined as the ratio of a
circle's circumference C to its diameter
d.
 π = C d The ratio C/d is constant,
regardless of the circle's size. For
example, if a circle has twice the
diameter of another circle it will also
have twice the circumference,
preserving the ratio C/d. This definition
of π implicitly makes use of flat
(Euclidean) geometry; although the
notion of a circle can be extended to
any curved (non-Euclidean) geometry,
these new circles will no longer satisfy
the formula π = C/d.
 Here, the circumference of a circle is
the arc length around the perimeter of
the circle, a quantity which can be
formally defined independently of
geometry using limits, a concept in
calculus.For example, one may
APPROXIMATE VALUE
 Some approximations of
pi include:
 Integers: 3
 Fractions: Approximate
fractions include (in order
of increasing accuracy)
22/7, 333/106, 355/113,
52163/16604,
103993/33102, and
245850922/78256779
ACTIVITY TO FINDPIE
 Step 1
 Draw a circle on your card.
The exact size doesn't
matter, but let's use a
radius of 5 cm.
 Use your protractor to
divide the circle up into
twelve equal sectors.
 What is the angle for each
sector? That's easy – just
divide 360° (one complete
turn) by 12:
 360° / 12 = 30°
 So each of the angles
must be 30°
Step 2
 Divide just one of
the sectors into
two equal parts –
that's 15° for each
sector.
 You now have
thirteen sectors –
number them 1 to
13:
Step 3
 Cut out the thirteen
sectors using the
scissors:
Step4
 Rearrange the 13 sectors like this (you
can glue them onto a piece of paper):
 Step 5
 Its height is the circle's radius: just look at sectors 1
and 13 above. When they are in the circle they are
"radius" high.
 Its width (actually one "bumpy" edge), is half of the
curved parts around the circle ... in other words it is
about half the circumference of the original circle. We
know that:
 Circumference = 2 × π × radius
 And so the width is:
 Half the Circumference = π × radius
 With a radius of 5 cm, the rectangle should be:
 5 cm high
 about 5π cm wide
Step 6
 Measure the actual length of your
"rectangle" as accurately as you can
using your ruler.
 Divide by the radius (5 cm) to get an
approximation for π
 Put your answer here:“”RACTANGLE WIDTH” DIVIDE BY 5
CM.
= π
15.7 3.14
2) PYTHAGOREAN
THEOREM
 Pythagoras was a Greek mathematician and a
philosopher, but was best known for his Pythagorean
Theorem.
 He was born around 572 B.C. on the island of Samos.
 For about 22 years, Pythagoras spent time traveling
though Egypt and Babylonia to educate himself.
 At about 530 B.C., he settled in a Greek town in
southern Italy called Crotona.
 Pythagoras formed a brotherhood that was an
exclusive society devoted to moral, political and social
life. This society was known as Pythagorean
INFORMATION
 The sum of the areas of the two
squares on the legs (a and b)
equals the area of the square on
the hypotenuse (c).
 In mathematics, the Pythagorean
theorem, also known as
Pythagoras' theorem, is a
fundamental relation in Euclidean
geometry among the three sides of
a right triangle.
 It states that the square of the
hypotenuse (the side opposite the
right angle) is equal to the sum of
the squares of the other two sides.
The theorem can be written as an
equation relating the lengths of the
sides a, b and c, often called the
"Pythagorean equation":
DEFINITION
 The sum of the squares of each leg of a
right angled triangle equals to the
square of the hypotenuse
a² + b² = c²
MANY PROOFS OF PYTHAGORENTHEOREM
 Proof using similar triangles
 Euclid's proof
 Proofs by dissection and
rearrangement
 Einstein's proof by dissection without
rearrangement
 Algebraic proofs
 Proof using differentials
CRYPTOGRAPHY
 Cryptography is the practice and
study of techniques for secure
communication in the presence of
third parties called adversaries.
 Modern cryptography exists at the
intersection of the disciplines of
mathematics, computer science, and
electrical engineering. Applications of
cryptography include ATM cards,
 computer passwords, and
electronic commerce
 Modern cryptography is heavily based
on mathematical theory and computer
science practice; cryptographic
algorithms are designed around
computational hardness assumptions,
making such algorithms hard to break
in practice by any adversary
ENCRYPTION = It is the process of converting
ordinary information (called plaintext) into
unintelligible text (called ciphertext).
DECRYPTION = It is the process of converting
unintelligible text (called ciphertext) into
ordinary information (called plaintext).
TYPES OF CRYPTOSYSTEMS
1) SYMMETRIC SYSTEM
 Symmetric-key cryptography, where a single
key is used for encryption and decryption
 Symmetric-key cryptography refers to
encryption methods in which both the sender
and receiver share the same key
2) ASYMMETRIC SYSTEM
 Asymmetric systems use a public-key
cryptosystems, the public key may be freely
distributed, while its paired private key must
remain secret. The public key is used for
encryption, while the private or secret key is used
for decryption.
 Use of asymmetric systems enhances the
security of communication. Examples of
asymmetric systems include RSA and ECC
 CIPHER = It is a pair of algorithms that create
the encryption and the reversing decryption.
 The detailed operation of a cipher is
controlled both by the algorithm and in each
instance by a "key"
TYPES OF CIPHERS
1] TRANSPOSITION CIPHERS = which
rearrange the order of letters in a message.
E.X= Plain text - 'hello world’.
Cipher text - 'ehlol owrdl'
2] SUBSTITUTION CIPHERS = which
systematically replace letters or groups of
letters with other letters or groups of letters
E.X= Plain text - 'fly at once'
Cipher text - 'gmz bu podf'
3] CAESAR CIPHER
in which each letter in the plaintext
was replaced by a letter some fixed number of
positions further down the alphabet.
Alphabet shift ciphers are believed to
have been used by Julius Caesar over 2,000
years ago.[5] This is an example with k=3. In
other words, the letters in the alphabet are
shifted three in one direction to encrypt and
three in the other direction to decrypt.
HISTORY OF CRYPTOGRAPHY
 German Lorenz cipher machine, used in World
War II to encrypt very-high-level general staff
messages
Finding value of pie and pythagorus and cryptography

More Related Content

PPTX
Mathematics Summer Holiday on PYTHAGORES
PDF
Math project for class 8
PDF
The Search for a Proof of Pi - Volume 2
PPTX
Similarity on right triangle
PPTX
Similarities in Right Triangle
PPTX
Right Triangle Similarity
PPT
Geometry 201 unit 5.3
PPTX
Geometry unit 5.2
Mathematics Summer Holiday on PYTHAGORES
Math project for class 8
The Search for a Proof of Pi - Volume 2
Similarity on right triangle
Similarities in Right Triangle
Right Triangle Similarity
Geometry 201 unit 5.3
Geometry unit 5.2

What's hot (20)

PPTX
CLASS IX MATHS Area of parallelogram
PPTX
Co ordinate system
PPT
Geometry 201 unit 5.5
PPT
Geometry 201 unit 5.4
PPT
7.4 Similarity in right triangles
PPT
Volume presentation
PPTX
Class IX Heron's Formula
PPT
Geometry unit 5.1
PPT
CLASS IX MATHS 6 areas of parallelogram and triangles
PPTX
Similar Triangles II
PPT
6.6 proportions & similar triangles
PPT
Pythagoras
PPTX
1.2 Ruler Postulates
DOCX
Best guess list for cal paper foundation
PPTX
53 pythagorean theorem and square roots
PPT
The Concept of Dimension
PPTX
Triangles
PPTX
Pythagorean theorem-and-special-right-triangles
PPTX
Pappus and desargues finite geometries
DOCX
Principle 2 (asri dwita 19709251014)
CLASS IX MATHS Area of parallelogram
Co ordinate system
Geometry 201 unit 5.5
Geometry 201 unit 5.4
7.4 Similarity in right triangles
Volume presentation
Class IX Heron's Formula
Geometry unit 5.1
CLASS IX MATHS 6 areas of parallelogram and triangles
Similar Triangles II
6.6 proportions & similar triangles
Pythagoras
1.2 Ruler Postulates
Best guess list for cal paper foundation
53 pythagorean theorem and square roots
The Concept of Dimension
Triangles
Pythagorean theorem-and-special-right-triangles
Pappus and desargues finite geometries
Principle 2 (asri dwita 19709251014)
Ad

Viewers also liked (20)

PDF
Resume 2
DOC
Os caracóis e as minhocas
DOC
November 2016 Resume
PPTX
COMUNICACIÓN INTERACTIVA
PPTX
DOC
dale_mcclure_resume_V5
PPTX
La roadmap italiana all' open data
PDF
Ranking escola 2015 2016.marzo
PDF
Divulgação UFCD Energia
DOCX
Resume of anuja
PDF
PPTX
театр уж полон…
PPTX
Objetos tecnologicos
PPTX
Ecoligia ambiental
DOCX
PPTX
PORT TRANSIT COSTS PERSPECTIVES AND EXPERIENCES OF GHANA PORTS ...
PPTX
CMA CGM Group Presentation
PPTX
MATHEMATICAL PI
Resume 2
Os caracóis e as minhocas
November 2016 Resume
COMUNICACIÓN INTERACTIVA
dale_mcclure_resume_V5
La roadmap italiana all' open data
Ranking escola 2015 2016.marzo
Divulgação UFCD Energia
Resume of anuja
театр уж полон…
Objetos tecnologicos
Ecoligia ambiental
PORT TRANSIT COSTS PERSPECTIVES AND EXPERIENCES OF GHANA PORTS ...
CMA CGM Group Presentation
MATHEMATICAL PI
Ad

Similar to Finding value of pie and pythagorus and cryptography (20)

PPTX
PPT
The Origin And History Of Pi By Nikitha Reddy
PPTX
Math advance projekt
PPTX
Maths Pi
PPTX
PI THE MATHEMATICAL CONSTANT
PDF
great-150816134029-lva1-app6892.pdf
PPTX
Application of Pi
PPTX
Presentation (8).pptx
PPTX
History of pie
PPT
Area and Circumference of a Circle.ppt
PPTX
PPT
All About Pi
PPTX
invention of pi
PPTX
Pi Day Presentation Pi Day -Presentation
PPT
circles
PPTX
A Project on Pi
PPTX
History of pi
PPTX
Interesections presentation
The Origin And History Of Pi By Nikitha Reddy
Math advance projekt
Maths Pi
PI THE MATHEMATICAL CONSTANT
great-150816134029-lva1-app6892.pdf
Application of Pi
Presentation (8).pptx
History of pie
Area and Circumference of a Circle.ppt
All About Pi
invention of pi
Pi Day Presentation Pi Day -Presentation
circles
A Project on Pi
History of pi
Interesections presentation

More from prashant chelani (8)

PPTX
Traffic engineering topic 19 street lighting
PPTX
Dm = Landslide and Avalanche
PPTX
Gate civil engineering
PPTX
Calculus multiple integral
PPTX
TYPES AND INFORMATION STONES
PPTX
Earth magnetic field
PPTX
Array and string
PPTX
Smartcity
Traffic engineering topic 19 street lighting
Dm = Landslide and Avalanche
Gate civil engineering
Calculus multiple integral
TYPES AND INFORMATION STONES
Earth magnetic field
Array and string
Smartcity

Recently uploaded (20)

PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PPTX
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
Anesthesia in Laparoscopic Surgery in India
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PDF
Insiders guide to clinical Medicine.pdf
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
01-Introduction-to-Information-Management.pdf
PDF
Basic Mud Logging Guide for educational purpose
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PDF
Pre independence Education in Inndia.pdf
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PDF
O7-L3 Supply Chain Operations - ICLT Program
PPTX
Institutional Correction lecture only . . .
PPTX
Pharma ospi slides which help in ospi learning
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
Pharmacology of Heart Failure /Pharmacotherapy of CHF
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
VCE English Exam - Section C Student Revision Booklet
Anesthesia in Laparoscopic Surgery in India
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
Insiders guide to clinical Medicine.pdf
Final Presentation General Medicine 03-08-2024.pptx
01-Introduction-to-Information-Management.pdf
Basic Mud Logging Guide for educational purpose
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
Pre independence Education in Inndia.pdf
Renaissance Architecture: A Journey from Faith to Humanism
O7-L3 Supply Chain Operations - ICLT Program
Institutional Correction lecture only . . .
Pharma ospi slides which help in ospi learning
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf

Finding value of pie and pythagorus and cryptography

  • 1. TOPIC – 1) FINDING VALUE OF PIE 2) PYTHAGORAS THEOREM 3) CRYPTOGRAPHY DR. S&S.S GANDHY GOVERMENT ENGINEERING COLLAGE
  • 3. 1] FINDING VALUE OF PIE  INFORMATION ABOUT PIE  NAME  DEFINITION  APPROXCIMATE VALUE  ACTIVITY TO FIND PIE
  • 4. INFORMATION ABOUT PIE  The number π is a mathematical constant, the ratio of a circle's circumference to its diameter, commonly approximated as 3.14159. It has been represented by the Greek letter "π" since the mid- 18th century, though it is also sometimes spelled out as "pi“.  Being an irrational number, π cannot be expressed exactly as a fraction. Still, fractions such as 22/7 and other rational numbers are commonly used to approximate π.  Because its definition relates to the circle, π is found in many formulae in trigonometry and geometry, especially those concerning circles, ellipses or spheres
  • 5. NAME  The symbol used by mathematicians to represent the ratio of a circle's circumference to its diameter is the lowercase Greek letter π, sometimes spelled out as pi, and derived from the first letter of the Greek word perimetros, meaning circumference. In English, π is pronounced as "pie“. In mathematical use, the lowercase letter π (or π in sans-serif font) is distinguished from its capital counterpart Π, which denotes a product of a sequence.  The choice of the symbol π is discussed in the section Adoption of the symbol π.
  • 6. DEFINITION  π is commonly defined as the ratio of a circle's circumference C to its diameter d.  π = C d The ratio C/d is constant, regardless of the circle's size. For example, if a circle has twice the diameter of another circle it will also have twice the circumference, preserving the ratio C/d. This definition of π implicitly makes use of flat (Euclidean) geometry; although the notion of a circle can be extended to any curved (non-Euclidean) geometry, these new circles will no longer satisfy the formula π = C/d.  Here, the circumference of a circle is the arc length around the perimeter of the circle, a quantity which can be formally defined independently of geometry using limits, a concept in calculus.For example, one may
  • 7. APPROXIMATE VALUE  Some approximations of pi include:  Integers: 3  Fractions: Approximate fractions include (in order of increasing accuracy) 22/7, 333/106, 355/113, 52163/16604, 103993/33102, and 245850922/78256779
  • 8. ACTIVITY TO FINDPIE  Step 1  Draw a circle on your card. The exact size doesn't matter, but let's use a radius of 5 cm.  Use your protractor to divide the circle up into twelve equal sectors.  What is the angle for each sector? That's easy – just divide 360° (one complete turn) by 12:  360° / 12 = 30°  So each of the angles must be 30°
  • 9. Step 2  Divide just one of the sectors into two equal parts – that's 15° for each sector.  You now have thirteen sectors – number them 1 to 13:
  • 10. Step 3  Cut out the thirteen sectors using the scissors:
  • 11. Step4  Rearrange the 13 sectors like this (you can glue them onto a piece of paper):
  • 12.  Step 5  Its height is the circle's radius: just look at sectors 1 and 13 above. When they are in the circle they are "radius" high.  Its width (actually one "bumpy" edge), is half of the curved parts around the circle ... in other words it is about half the circumference of the original circle. We know that:  Circumference = 2 × π × radius  And so the width is:  Half the Circumference = π × radius  With a radius of 5 cm, the rectangle should be:  5 cm high  about 5π cm wide
  • 13. Step 6  Measure the actual length of your "rectangle" as accurately as you can using your ruler.  Divide by the radius (5 cm) to get an approximation for π  Put your answer here:“”RACTANGLE WIDTH” DIVIDE BY 5 CM. = π 15.7 3.14
  • 14. 2) PYTHAGOREAN THEOREM  Pythagoras was a Greek mathematician and a philosopher, but was best known for his Pythagorean Theorem.  He was born around 572 B.C. on the island of Samos.  For about 22 years, Pythagoras spent time traveling though Egypt and Babylonia to educate himself.  At about 530 B.C., he settled in a Greek town in southern Italy called Crotona.  Pythagoras formed a brotherhood that was an exclusive society devoted to moral, political and social life. This society was known as Pythagorean
  • 15. INFORMATION  The sum of the areas of the two squares on the legs (a and b) equals the area of the square on the hypotenuse (c).  In mathematics, the Pythagorean theorem, also known as Pythagoras' theorem, is a fundamental relation in Euclidean geometry among the three sides of a right triangle.  It states that the square of the hypotenuse (the side opposite the right angle) is equal to the sum of the squares of the other two sides. The theorem can be written as an equation relating the lengths of the sides a, b and c, often called the "Pythagorean equation":
  • 16. DEFINITION  The sum of the squares of each leg of a right angled triangle equals to the square of the hypotenuse a² + b² = c²
  • 17. MANY PROOFS OF PYTHAGORENTHEOREM  Proof using similar triangles  Euclid's proof  Proofs by dissection and rearrangement  Einstein's proof by dissection without rearrangement  Algebraic proofs  Proof using differentials
  • 18. CRYPTOGRAPHY  Cryptography is the practice and study of techniques for secure communication in the presence of third parties called adversaries.  Modern cryptography exists at the intersection of the disciplines of mathematics, computer science, and electrical engineering. Applications of cryptography include ATM cards,  computer passwords, and electronic commerce  Modern cryptography is heavily based on mathematical theory and computer science practice; cryptographic algorithms are designed around computational hardness assumptions, making such algorithms hard to break in practice by any adversary
  • 19. ENCRYPTION = It is the process of converting ordinary information (called plaintext) into unintelligible text (called ciphertext). DECRYPTION = It is the process of converting unintelligible text (called ciphertext) into ordinary information (called plaintext).
  • 20. TYPES OF CRYPTOSYSTEMS 1) SYMMETRIC SYSTEM  Symmetric-key cryptography, where a single key is used for encryption and decryption  Symmetric-key cryptography refers to encryption methods in which both the sender and receiver share the same key
  • 21. 2) ASYMMETRIC SYSTEM  Asymmetric systems use a public-key cryptosystems, the public key may be freely distributed, while its paired private key must remain secret. The public key is used for encryption, while the private or secret key is used for decryption.  Use of asymmetric systems enhances the security of communication. Examples of asymmetric systems include RSA and ECC
  • 22.  CIPHER = It is a pair of algorithms that create the encryption and the reversing decryption.  The detailed operation of a cipher is controlled both by the algorithm and in each instance by a "key"
  • 23. TYPES OF CIPHERS 1] TRANSPOSITION CIPHERS = which rearrange the order of letters in a message. E.X= Plain text - 'hello world’. Cipher text - 'ehlol owrdl' 2] SUBSTITUTION CIPHERS = which systematically replace letters or groups of letters with other letters or groups of letters E.X= Plain text - 'fly at once' Cipher text - 'gmz bu podf'
  • 24. 3] CAESAR CIPHER in which each letter in the plaintext was replaced by a letter some fixed number of positions further down the alphabet. Alphabet shift ciphers are believed to have been used by Julius Caesar over 2,000 years ago.[5] This is an example with k=3. In other words, the letters in the alphabet are shifted three in one direction to encrypt and three in the other direction to decrypt.
  • 25. HISTORY OF CRYPTOGRAPHY  German Lorenz cipher machine, used in World War II to encrypt very-high-level general staff messages