Chapter 2 Linear Autonomous Odes

Total Page:16

File Type:pdf, Size:1020Kb

Chapter 2 Linear Autonomous Odes Chapter 2 Linear autonomous ODEs 2.1 Linearity Linear ODEs form an important class of ODEs. They are characterized by the fact that the vector field f : Rm Rp R Rm is linear (at constant value of the parameters and time), that is for all x, y ×Rm and× a,→ b R ∈ ∈ f(ax + by,λ,t)= af(x,λ,t)+ bf(y,λ,t). This implies that the vector field may be represented by an m m matrix A(λ, t), so that × dx = A(λ, t)x. dt In this chapter we will focus on the case that the matrix A does not depend on time (so that the ODE is autonomous): dx = A(λ)x, dt It turns out that Proposition 2.1.1. The flow of an ODE is linear if and only if the corresponding vector field is linear. t1,t0 t1,t0 t1,t0 t1,t0 R Proof. The flow Φλ is linear if Φλ (ax + by) = aΦλ (x)+ bΦλ (y) for all a, b and x, y Rm. Equation (1.2.1) contains the formal definition of the flow map, from∈ which it ∈ immediately follows that linearity of Φ in x is correlated with linearity of f in x. 2.2 Explicit solution: exponential We consider the linear autonomous ODE dx = Ax, (2.2.1) dt 11 12 CHAPTER 2. LINEAR AUTONOMOUS ODES where x Rm and A gl(m, R) (an m m matrix with real entries). ∈ ∈ × In the case that m = 1, when A R, the flow map Φt of the linear ODE is equal to (multiplication by) exp(At). ∈ It turns out that we can write the flow map of a general linear autonomous ODE in this same form, if we define the exponential operator as Definition 2.2.1. Let L gl(m, R), then ∈ ∞ Lk exp(L) := k! Xk=0 You should recognize the familiar Taylor expansion of the exponential function in the case that m = 1. In the formula, Lk represents the matrix product of k consecutive matrices L. It follows that exp(L) is also a linear map (which can be represented by an m m matrix). Moreover, it is invertible, with inverse exp( L). Technically, one may worry about× the fact − whether the coefficients of the matrix exp(L) are indeed all smaller than infinity. But it is in fact not too hard to find an upper bound for any of the entries of exp(L) given that the entries of the matrix L are finite. (See exercise) Theorem 2.2.2. The linear autonomous ODE (2.2.1) with initial condition x(0) = y has the unique solution x(t) = exp(At)y. Proof. We use the definition of the derivative: d exp((t + h)A) exp(tA) exp(At) = lim − dt h 0 h → exp(hA) I = lim − exp(tA) h 0 h → 1 ∞ (hA)n = lim exp(tA) h 0 h n! → n=1 ! X hA 1 ∞ (hA)n = lim + exp(tA) h 0 h h n! → n=2 ! X ∞ Aj+2 = lim A + h hj exp(tA)= A exp(tA). h 0 (j + 2)! → j=0 ! X d Since y is constant it thus follows that dt x(t)= A exp(At)y = Ax(t). To show that the solution is unique, suppose that x(t) is a solution. We calculate (by using the chain rule) d d dx(t) (exp( tA)x(t)) = exp( tA) x(t)) + exp( tA) dt − dt − − dt = A exp( At)x(t) + exp( tA)Ax(t)=0. − − − 2.3. COMPUTATION OF THE FLOW MAP 13 Hence, x(t) = exp(tA)c where c Rm is some constant. We observe that this constant is entirely determined to be equal to∈y by the boundary condition x(0) = y. Hence the solution x(t) = exp(tA)y is unique. It is easy to extend the result to the case of initial condition x(τ) = y, yielding x(t) = exp(A(t τ))y. − Corollary 2.2.3 (Existence and uniqueness). For the linear autonomous ODE (2.2.1), through each point y in the phase space passes exactly one solution at time t = τ, namely x(t) = exp(A(t τ))y. − 2.3 Computation of the flow map 2.3.1 The planar case We consider the calculation of the flow map exp(At). Before dealing with matters in higher dimension we first focus on the case of ODEs on the plane R2. We consider the calculation of the flow map exp(At). Recall the definition of the exponential of a linear map (matrix) in Definition 2.2.1. Example 2.3.1 (Hyperbolic). Let λ 0 A = 1 , 0 λ 2 with λ ,λ R, then 1 2 ∈ k λ1t 0 k k k λ1 t λ1t ∞ ∞ 0 λ t ∞ (At) 2 k=0 k! 0 e 0 exp(At)= = = k k = λ2t k! k! λ2 t 0 e 0 k∞=0 ! Xk=0 Xk=0 P k! Example 2.3.2 (Elliptic). Let P 0 β A = , β −0 with β R, then ∈ β2 0 A2 = − = β2I, 0 β2 − − so that for all k N ∈ 0 ( )k+1β2k+1 A2k =( )kβ2kI, A2k+1 = − . − ( )kβ2k+1 0 − so that 2 2 +1 k (βt) k k (βt) k ∞ ∞ k=0( 1) (2k)! k=0( 1) (2k+1)! cos(βt) sin(βt) exp(At)= − 2k+1 − − 2k = . k (βt) k (βt) − ∞ ( 1) ∞ ( 1) ! sin(βt) cos(βt) Pk=0 − (2k+1)! P k=0 − (2k)! P P 14 CHAPTER 2. LINEAR AUTONOMOUS ODES Example 2.3.3 (Jordan Block). Let λ 1 A = , 0 λ with λ R, then ∈ λk kλk 1 Ak = − . 0 λk so that (λt)k (λt)k λt λt ∞ ∞ k=0 k! t k=0 k! e te exp(At)= (λt)k = λt . 0 ∞ 0 e P Pk=0 k! ! P Distinct real eigenvalues dx R R2 We consider a linear autonomous ODE dt = Ax, with A gl(2, ) andx . Suppose that A has a real eigenvalue µ with orresponding eigenvector v∈with. Then if we∈ consider an initial condition on the linear subspace V that is generated by v (a line) then we find that V is an invariant subspace for the flow, that is Φt(V )= V . In fact, we may express that ODE restricted dv to V as dt = µv, and the flow map of this restricted ODE is (multiplication by) exp(µt). Suppose now that A has two distinct eigenvalues µ = µ . Then it follows that the cor- 1 6 2 responding eigenvectors v1 and v2 must be linearly independent, i.e. v1 = av2 for all a R. 2 6 ∈ In other words, v1 and v2 span the plane R . As a consequence, we may write any point as a linear combination of the two eigenvectors x = av1 + bv2, (2.3.1) and by linearity of the flow map, and knowing the flow in the directions of the eigenvectors, we obtain t t t t λ1t λ2t Φ (x) = Φ (av1 + bv2)= aΦ (v1)+ bΦ (v2)= ae v1 + be v2. (2.3.2) In order to find the matrix expression for Φt we now need to find expressions for the coefficients a and b in (2.3.1). We do this by taking the (standard matrix) product on both sides with vectors (vi⊥)⊤, where vi⊥ is perpendicular to the eigenvector vi, for i =1, 2: (v ) x (v ) x a = 2⊥ ⊤ , b = 1⊥ ⊤ . (v2⊥)⊤v1 (v1⊥)⊤v2 On a more abstract level, we may think of the vectors av1 and bv2 being obtained from the vector x by projection: 1 P1x = av1 = v1((v2⊥)⊤v1)− (v2⊥)⊤x, 1 P2x = bv2 = v2((v1⊥v2)⊤)− (v1⊥)⊤x. Note that projections P are linear maps that satisfy the property that P 2 = P . As they are linear, we can represent them by matrices: 1 1 P1 = v1((v2⊥)⊤v1)− (v2⊥)⊤, P2 = v2((v1⊥)⊤v2)− (v1⊥)⊤. 2.3. COMPUTATION OF THE FLOW MAP 15 So in terms of these expressions, we can rewrite (2.3.2) as t λ1t λ2t Φ = e P1 + e P2. (2.3.3) 1 1 Example 2.3.4. Let A = , then the eigenvalues are equal to λ = 1 and λ = 2 with 0 2 1 2 1 1 corresponding eigenvectors v = and v = . Any vector in R2 can be decomposed 1 0 2 1 into a linear combination of these eigenvectors as follows: x 1 1 =(x y) + y . y − 0 1 Hence, x 1 1 (x y)et + ye2t et e2t et x exp(At) =(x y)et + ye2t = − = − , y − 0 1 ye2t 0 e2t y so that 1 1 0 1 exp(At)= et − + e2t . 0 0 0 1 We now construct the projections using the formulas we obtained above. Choosing the perpen- 0 1 dicular vectors (for instance) as v = and v = , we obtain 1⊥ 1 2⊥ 1 − 1 1 1 1 0 1 P = v ((v⊥)⊤v )− (v⊥)⊤ = , P = v ((v⊥)⊤v )− (v⊥)⊤ = . 1 1 2 1 2 0− 0 2 2 1 2 1 0 1 The answer in Example 2.3.1 can be evaluated in the same way. We note that the above procedure can also be carried out in the higher dimensional case. In the m-dimensional case, if A has m distinct real eigenvalues λ1,...,λm then m λkt exp(At)= e Pk, Xk=1 where Pk is the projection to the one-dimensional subspace spanned by the eigenvector for eigenvalue λ with kernel equal to the (m 1)-dimensional subspace spanned by the collection k − of all other eigenvectors.
Recommended publications
  • Orthogonal Complements (Revised Version)
    Orthogonal Complements (Revised Version) Math 108A: May 19, 2010 John Douglas Moore 1 The dot product You will recall that the dot product was discussed in earlier calculus courses. If n x = (x1: : : : ; xn) and y = (y1: : : : ; yn) are elements of R , we define their dot product by x · y = x1y1 + ··· + xnyn: The dot product satisfies several key axioms: 1. it is symmetric: x · y = y · x; 2. it is bilinear: (ax + x0) · y = a(x · y) + x0 · y; 3. and it is positive-definite: x · x ≥ 0 and x · x = 0 if and only if x = 0. The dot product is an example of an inner product on the vector space V = Rn over R; inner products will be treated thoroughly in Chapter 6 of [1]. Recall that the length of an element x 2 Rn is defined by p jxj = x · x: Note that the length of an element x 2 Rn is always nonnegative. Cauchy-Schwarz Theorem. If x 6= 0 and y 6= 0, then x · y −1 ≤ ≤ 1: (1) jxjjyj Sketch of proof: If v is any element of Rn, then v · v ≥ 0. Hence (x(y · y) − y(x · y)) · (x(y · y) − y(x · y)) ≥ 0: Expanding using the axioms for dot product yields (x · x)(y · y)2 − 2(x · y)2(y · y) + (x · y)2(y · y) ≥ 0 or (x · x)(y · y)2 ≥ (x · y)2(y · y): 1 Dividing by y · y, we obtain (x · y)2 jxj2jyj2 ≥ (x · y)2 or ≤ 1; jxj2jyj2 and (1) follows by taking the square root.
    [Show full text]
  • Does Geometric Algebra Provide a Loophole to Bell's Theorem?
    Discussion Does Geometric Algebra provide a loophole to Bell’s Theorem? Richard David Gill 1 1 Leiden University, Faculty of Science, Mathematical Institute; [email protected] Version October 30, 2019 submitted to Entropy Abstract: Geometric Algebra, championed by David Hestenes as a universal language for physics, was used as a framework for the quantum mechanics of interacting qubits by Chris Doran, Anthony Lasenby and others. Independently of this, Joy Christian in 2007 claimed to have refuted Bell’s theorem with a local realistic model of the singlet correlations by taking account of the geometry of space as expressed through Geometric Algebra. A series of papers culminated in a book Christian (2014). The present paper first explores Geometric Algebra as a tool for quantum information and explains why it did not live up to its early promise. In summary, whereas the mapping between 3D geometry and the mathematics of one qubit is already familiar, Doran and Lasenby’s ingenious extension to a system of entangled qubits does not yield new insight but just reproduces standard QI computations in a clumsy way. The tensor product of two Clifford algebras is not a Clifford algebra. The dimension is too large, an ad hoc fix is needed, several are possible. I further analyse two of Christian’s earliest, shortest, least technical, and most accessible works (Christian 2007, 2011), exposing conceptual and algebraic errors. Since 2015, when the first version of this paper was posted to arXiv, Christian has published ambitious extensions of his theory in RSOS (Royal Society - Open Source), arXiv:1806.02392, and in IEEE Access, arXiv:1405.2355.
    [Show full text]
  • Signing a Linear Subspace: Signature Schemes for Network Coding
    Signing a Linear Subspace: Signature Schemes for Network Coding Dan Boneh1?, David Freeman1?? Jonathan Katz2???, and Brent Waters3† 1 Stanford University, {dabo,dfreeman}@cs.stanford.edu 2 University of Maryland, [email protected] 3 University of Texas at Austin, [email protected]. Abstract. Network coding offers increased throughput and improved robustness to random faults in completely decentralized networks. In contrast to traditional routing schemes, however, network coding requires intermediate nodes to modify data packets en route; for this reason, standard signature schemes are inapplicable and it is a challenge to provide resilience to tampering by malicious nodes. Here, we propose two signature schemes that can be used in conjunction with network coding to prevent malicious modification of data. In particular, our schemes can be viewed as signing linear subspaces in the sense that a signature σ on V authenticates exactly those vectors in V . Our first scheme is homomorphic and has better performance, with both public key size and per-packet overhead being constant. Our second scheme does not rely on random oracles and uses weaker assumptions. We also prove a lower bound on the length of signatures for linear subspaces showing that both of our schemes are essentially optimal in this regard. 1 Introduction Network coding [1, 25] refers to a general class of routing mechanisms where, in contrast to tra- ditional “store-and-forward” routing, intermediate nodes modify data packets in transit. Network coding has been shown to offer a number of advantages with respect to traditional routing, the most well-known of which is the possibility of increased throughput in certain network topologies (see, e.g., [21] for measurements of the improvement network coding gives even for unicast traffic).
    [Show full text]
  • Quantification of Stability in Systems of Nonlinear Ordinary Differential Equations Jason Terry
    University of New Mexico UNM Digital Repository Mathematics & Statistics ETDs Electronic Theses and Dissertations 2-14-2014 Quantification of Stability in Systems of Nonlinear Ordinary Differential Equations Jason Terry Follow this and additional works at: https://digitalrepository.unm.edu/math_etds Recommended Citation Terry, Jason. "Quantification of Stability in Systems of Nonlinear Ordinary Differential Equations." (2014). https://digitalrepository.unm.edu/math_etds/48 This Dissertation is brought to you for free and open access by the Electronic Theses and Dissertations at UNM Digital Repository. It has been accepted for inclusion in Mathematics & Statistics ETDs by an authorized administrator of UNM Digital Repository. For more information, please contact [email protected]. Candidate Department This dissertation is approved, and it is acceptable in quality and form for publication: Approved by the Dissertation Committee: , Chairperson Quantification of Stability in Systems of Nonlinear Ordinary Differential Equations by Jason Terry B.A., Mathematics, California State University Fresno, 2003 B.S., Computer Science, California State University Fresno, 2003 M.A., Interdiscipline Studies, California State University Fresno, 2005 M.S., Applied Mathematics, University of New Mexico, 2009 DISSERTATION Submitted in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy Mathematics The University of New Mexico Albuquerque, New Mexico December, 2013 c 2013, Jason Terry iii Dedication To my mom. iv Acknowledgments I would like
    [Show full text]
  • Lecture 6: Linear Codes 1 Vector Spaces 2 Linear Subspaces 3
    Error Correcting Codes: Combinatorics, Algorithms and Applications (Fall 2007) Lecture 6: Linear Codes January 26, 2009 Lecturer: Atri Rudra Scribe: Steve Uurtamo 1 Vector Spaces A vector space V over a field F is an abelian group under “+” such that for every α ∈ F and every v ∈ V there is an element αv ∈ V , and such that: i) α(v1 + v2) = αv1 + αv2, for α ∈ F, v1, v2 ∈ V. ii) (α + β)v = αv + βv, for α, β ∈ F, v ∈ V. iii) α(βv) = (αβ)v for α, β ∈ F, v ∈ V. iv) 1v = v for all v ∈ V, where 1 is the unit element of F. We can think of the field F as being a set of “scalars” and the set V as a set of “vectors”. If the field F is a finite field, and our alphabet Σ has the same number of elements as F , we can associate strings from Σn with vectors in F n in the obvious way, and we can think of codes C as being subsets of F n. 2 Linear Subspaces Assume that we’re dealing with a vector space of dimension n, over a finite field with q elements. n We’ll denote this as: Fq . Linear subspaces of a vector space are simply subsets of the vector space that are closed under vector addition and scalar multiplication: n n In particular, S ⊆ Fq is a linear subspace of Fq if: i) For all v1, v2 ∈ S, v1 + v2 ∈ S. ii) For all α ∈ Fq, v ∈ S, αv ∈ S. Note that the vector space itself is a linear subspace, and that the zero vector is always an element of every linear subspace.
    [Show full text]
  • Worksheet 1, for the MATLAB Course by Hans G. Feichtinger, Edinburgh, Jan
    Worksheet 1, for the MATLAB course by Hans G. Feichtinger, Edinburgh, Jan. 9th Start MATLAB via: Start > Programs > School applications > Sci.+Eng. > Eng.+Electronics > MATLAB > R2007 (preferably). Generally speaking I suggest that you start your session by opening up a diary with the command: diary mydiary1.m and concluding the session with the command diary off. If you want to save your workspace you my want to call save today1.m in order to save all the current variable (names + values). Moreover, using the HELP command from MATLAB you can get help on more or less every MATLAB command. Try simply help inv or help plot. 1. Define an arbitrary (random) 3 × 3 matrix A, and check whether it is invertible. Calculate the inverse matrix. Then define an arbitrary right hand side vector b and determine the (unique) solution to the equation A ∗ x = b. Find in two different ways the solution to this problem, by either using the inverse matrix, or alternatively by applying Gauss elimination (i.e. the RREF command) to the extended system matrix [A; b]. In addition look at the output of the command rref([A,eye(3)]). What does it tell you? 2. Produce an \arbitrary" 7 × 7 matrix of rank 5. There are at east two simple ways to do this. Either by factorization, i.e. by obtaining it as a product of some 7 × 5 matrix with another random 5 × 7 matrix, or by purposely making two of the rows or columns linear dependent from the remaining ones. Maybe the second method is interesting (if you have time also try the first one): 3.
    [Show full text]
  • 3. Hilbert Spaces
    3. Hilbert spaces In this section we examine a special type of Banach spaces. We start with some algebraic preliminaries. Definition. Let K be either R or C, and let Let X and Y be vector spaces over K. A map φ : X × Y → K is said to be K-sesquilinear, if • for every x ∈ X, then map φx : Y 3 y 7−→ φ(x, y) ∈ K is linear; • for every y ∈ Y, then map φy : X 3 y 7−→ φ(x, y) ∈ K is conjugate linear, i.e. the map X 3 x 7−→ φy(x) ∈ K is linear. In the case K = R the above properties are equivalent to the fact that φ is bilinear. Remark 3.1. Let X be a vector space over C, and let φ : X × X → C be a C-sesquilinear map. Then φ is completely determined by the map Qφ : X 3 x 7−→ φ(x, x) ∈ C. This can be see by computing, for k ∈ {0, 1, 2, 3} the quantity k k k k k k k Qφ(x + i y) = φ(x + i y, x + i y) = φ(x, x) + φ(x, i y) + φ(i y, x) + φ(i y, i y) = = φ(x, x) + ikφ(x, y) + i−kφ(y, x) + φ(y, y), which then gives 3 1 X (1) φ(x, y) = i−kQ (x + iky), ∀ x, y ∈ X. 4 φ k=0 The map Qφ : X → C is called the quadratic form determined by φ. The identity (1) is referred to as the Polarization Identity.
    [Show full text]
  • 10. Vector Subspaces the Solution to a Homogeneous Equation a X = 0
    10. Vector subspaces The solution to a homogeneous equation A~x = ~0 in R3 is one of • The origin. • A line through the origin. • A plane through the origin. • The whole of R3. These are all examples of linear subspaces. Definition 10.1. Let H be a subset of Rn. H is called a linear subspace if (1) ~0 2 H. (2) H is closed under addition: If ~u and ~v 2 H then ~u + ~v 2 H. (3) H is closed under scalar multiplication: If ~u and λ is a scalar then λ~u 2 H. Geometrically H is closed under scalar multiplication if and only if H is a union of lines through the origin. H is then closed under addition if and only if it contains every plane containing ever pair of lines. Example 10.2. Let H = f~0g. Then H is a linear subspace. Indeed, ~0 2 H. ~0 + ~0 = ~0 2 H. Similarly λ~0 = ~0. Example 10.3. Let H = Rn. Then H is a linear subspace. Indeed, ~0 2 H. H is obviously closed under addition and scalar multiplication. Now consider lines in R3. Example 10.4. Let H be the x-axis. Then H is a linear subspace. Indeed, ~0 2 H. If ~u and ~v belong to H then ~u and ~v are multiples of (1; 0; 0) and the sum is a multiple of (1; 0; 0). Similarly if λ is a scalar then λ~u is a multiple of (1; 0; 0). Example 10.5. Let H be a line in R3 through the origin.
    [Show full text]
  • Dual Principal Component Pursuit and Filtrated Algebraic Subspace
    Dual Principal Component Pursuit and Filtrated Algebraic Subspace Clustering by Manolis C. Tsakiris A dissertation submitted to The Johns Hopkins University in conformity with the requirements for the degree of Doctor of Philosophy. Baltimore, Maryland March, 2017 c Manolis C. Tsakiris 2017 All rights reserved Abstract Recent years have witnessed an explosion of data across scientific fields enabled by ad- vances in sensor technology and distributed hardware systems. This has given rise to the challenge of efficiently processing such data for performing various tasks, such as face recognition in images and videos. Towards that end, two operations on the data are of fun- damental importance, i.e., dimensionality reduction and clustering, and the idea of learning one or more linear subspaces from the data has proved a fruitful notion in that context. Nev- ertheless, state-of-the-art methods, such as Robust Principal Component Analysis (RPCA) or Sparse Subspace Clustering (SSC), operate under the hypothesis that the subspaces have dimensions that are small relative to the ambient dimension, and fail otherwise. This thesis attempts to advance the state-of-the-art of subspace learning methods in the regime where the subspaces have high relative dimensions. The first major contribution of this thesis is a single subspace learning method called Dual Principal Component Pursuit (DPCP), which solves the robust PCA problem in the presence of outliers. Contrary to sparse and low-rank state-of-the-art methods, the theoretical guarantees of DPCP do not place any constraints on the dimension of the subspace. In particular, DPCP computes the ii ABSTRACT orthogonal complement of the subspace, thus it is particularly suited for subspaces of low codimension.
    [Show full text]
  • Linear Algebra Review Vectors
    Linear Algebra Review By Tim K. Marks UCSD Borrows heavily from: Jana Kosecka [email protected] http://cs.gmu.edu/~kosecka/cs682.html Virginia de Sa Cogsci 108F Linear Algebra review UCSD Vectors The length of x, a.k.a. the norm or 2-norm of x, is 2 2 2 x = x1 + x2 +L+ xn e.g., x = 32 + 22 + 52 = 38 ! ! 1 Good Review Materials http://www.imageprocessingbook.com/DIP2E/dip2e_downloads/review_material_downloads.htm (Gonzales & Woods review materials) Chapt. 1: Linear Algebra Review Chapt. 2: Probability, Random Variables, Random Vectors Online vector addition demo: http://www.pa.uky.edu/~phy211/VecArith/index.html 2 Vector Addition u+v v u Vector Subtraction u-v u v 3 Example (on board) Inner product (dot product) of two vectors # 6 & "4 % % ( $ ' a = % 2 ( b = $1 ' $%" 3'( #$5 &' a" b = aT b ! ! #4 & % ( = [6 2 "3] %1 ( ! $%5 '( = 6" 4 + 2"1+ (#3)" 5 =11 ! ! ! 4 Inner (dot) Product The inner product is a SCALAR. v α u 5 Transpose of a Matrix Transpose: Examples: If , we say A is symmetric. Example of symmetric matrix 6 7 8 9 Matrix Product Product: A and B must have compatible dimensions In Matlab: >> A*B Examples: Matrix Multiplication is not commutative: 10 Matrix Sum Sum: A and B must have the same dimensions Example: Determinant of a Matrix Determinant: A must be square Example: 11 Determinant in Matlab Inverse of a Matrix If A is a square matrix, the inverse of A, called A-1, satisfies AA-1 = I and A-1A = I, Where I, the identity matrix, is a diagonal matrix with all 1’s on the diagonal.
    [Show full text]
  • Linear Subspaces
    LINEAR SUBSPACES 1. Subspaces of Rn We wish to generalize the notion of lines and planes. To that end, say a subset W ⊂ Rn is a (linear) subspace if it has the following three properties: (1) (Non-empty): ~0 2 W ; (2) (Closed under addition): ~v1;~v2 2 W ) ~v1 + ~v2 2 W ; (3) (Closed under scaling): ~v 2 W and k 2 R ) k~v 2 W . n o EXAMPLE: ~0 and Rn are subspaces of Rn for any n ≥ 1. 1 EXAMPLE: Line t : t 2 given by x = x is a subspace. 1 R 1 2 x 1 1 NON-EXAMPLE: W = : x ≥ 0; y ≥ 0 . As 2 W; but − 62 W: y 1 1 EXAMPLE: If T : Rm ! Rn, then ker(T ) is a subspace and Rm and Im (T ) is a subspace of Rn. For instance, (1) T (~0) = ~0 ) ~0 2 ker(T ); (2) ~v1;~v2 2 ker(T ) ) T (~v1 + ~v2) = T (~v1) + T (~v2) = ~0 ) ~v1 + ~v2 2 ker(T ); (3) ~v 2 ker(T ); k 2 R ! T (k~v) = kT (~v) = k~0 = ~0 ) k~v 2 ker(T ): 2. Span of vectors n Given a set of vectors ~v1; : : : ;~vm 2 R we define the span of these vectors to be W = span(~v1; : : : ;~vk) = fc1~v1 + ::: + ck~vk : c1; : : : ; cm 2 Rg In other words, ~w 2 W means ~w is a linear combination of the ~vi. If A = ~v1 j · · · j ~vm is the n × m matrix with columns ~vi, then span(~v1; : : : ;~vk) = Im (A) n and so span(~v1; : : : ;~vk) is a subspace of R .
    [Show full text]
  • Clifford Algebra and the Projective Model of Homogeneous Metric Spaces
    Clifford algebra and the projective model of homogeneous metric spaces: Foundations Andrey Sokolov July 12, 2013 Contents 1 Introduction 3 2 2-dimensional geometry 5 2.1 Projective foundations . .5 2.1.1 Projective duality . .5 2.1.2 Top-down view of geometry . .7 2.1.3 Points at infinity . .8 2.1.4 Extending lines with points at infinity . 10 2.1.5 The line at infinity . 10 2.1.6 Orientation of finite points (sheaves) . 12 2.1.7 Orientation of points at infinity (stacks) and lines . 13 2.1.8 Embedding . 14 2.2 Grassmann algebra . 16 2.3 Visualising bivectors and trivectors . 18 2.4 The metric and Clifford algebra . 20 2.5 Orthogonality in R3∗ with elliptic metric . 22 arXiv:1307.2917v1 [math.MG] 8 Jul 2013 2.6 Duality transformation on multivectors and the join . 24 2.7 Generalising duality transformation to R(n+1)∗ ...................... 26 2.8 Representing orientation and weight with blades . 28 2.9 Euclidean plane E2 ..................................... 32 2.10 Linear functions . 40 3 3-dimensional geometry 46 3.1 Points and planes . 46 3.2 Lines . 47 1 3.3 Points, lines, and the plane at infinity . 49 3.4 Embedding and Grassmann algebra . 50 3.5 Orientation . 53 3.6 The metric and Clifford algebra . 57 3.7 Euclidean space E3 ..................................... 59 4 4-dimensional geometry 72 4.1 Introduction . 72 4.2 Embedding and Grassmann algebra . 73 4.3 The metric and Clifford algebra . 80 4.4 Euclidean hyperspace E4 .................................. 81 5 1-dimensional geometry 85 5.1 Euclidean line E1 .....................................
    [Show full text]