0% found this document useful (0 votes)
5 views15 pages

Ce 501 Spring 2025 Lecture 2 Notes

The document outlines the copyright protections for course materials and discusses various mathematical concepts related to vector spaces, matrix operations, and elimination methods. It emphasizes the importance of understanding matrix inverses, subspaces, and the properties of linear combinations. Additionally, it highlights the legal implications for copyright infringement in an academic setting.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views15 pages

Ce 501 Spring 2025 Lecture 2 Notes

The document outlines the copyright protections for course materials and discusses various mathematical concepts related to vector spaces, matrix operations, and elimination methods. It emphasizes the importance of understanding matrix inverses, subspaces, and the properties of linear combinations. Additionally, it highlights the legal implications for copyright infringement in an academic setting.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 15

CE 501 SPRING 2025 LECTURE 2

Contents in all materials made available on the course pages or sent to students via different means for
course purposes (i.e. writing, audio, '1 picture, image, photograph, video) belong to the relevant
copyright owners, and are protected under the Law on Intellectual and Artistic Works, Commercial
Law, Civil Law, Code of Obligations, Law on the Protection of Personal Data, Turkish Criminal Law, and
other special laws. Infringers shall be concurrently subject to disciplinary, legal, and penal sanctions as
per both the relevant legislations and school disciplinary law.

OUTLINE
-

REVIEW

ELIMINATION
VECTOR SPACES

REVIEW

[]
A .
X = b
177X1
mxnnX1
↓ t
known
known unknown

2x + 3z 5
y
=
-
+

10
\x 2y 42
-
-
+ =

2x 3z =
5
y
- -
-

- 1-
- 4
-
2

*
=

box
Azxz
:

Matrix Multiplication
lisual Method
jth
-

- -

it h
I -
I
i

Anxi Bnxr xr

Cij
=
product of throw of Matrix A

and jth column of matrix B


[Ain Aiz .... Ain]
1X17

-
2 -
* in Bij +
Aiz Bzj +
AisBzj + ----
+
AinBnj
=
Gij

ex[2, ](2) ) =

Second POV (point of view)

(2)(x (5) (3)


i 57(
=

+
=

En other words ,
the columns of C is

the Linear combinations of columns of A

by
the elements of Matrix B
.

i573 J = -

C
B
A .

Third POU
We take 2 of

[25]() (
row 1 of B
plus
=

5 of row 2 of
B = Istrow of
Fexz Bex C

3-
the rows of C is the Linear combinations

of rows of B
by the elements of matrix
A

i573] =
C
B
A .

is 1
goal to solve A =
our .
X

ELIMINATION

+ 2x2 + 2
Xz
=
x

3x1 + 8x2 + X
=
12

+ = 2
4X2 X

· ) Pox)
I 2

3 S
Axz
=

First write the augmented matrix E


Goal is to remove nonzero element
only
under each pivot.
4-
-
2NDpivot
istpivot

I i I i I
2
I 2 1 STEP D 2 12

881123) 02
-
26

1 2
0412 04 !
-

s
C
A U
-

We

i i
use
STEP T 2 12
> back substitution
2)
-

(3 ,
o E -
26
-
2
xj =

00 5-10 * =
1
-
2
↓ 2
Xy
=

grapivot

Ax =
b >
-

u .
X = C
elimination

X = 1
3x/
- 2

ez)

-
ob
-

A4XY
1 1 0

0 o 1 I

10 1 O

0 1

Xyx)
-
5 -
STEP

i
by
(3 , 1) 10 o

b
0 o 1 I 2

O
-

b + b3
0 =
11
D4
0 10 I -

and
permite row 2 3

i ii !
10

& # 1 · :
1 1
O ~

O 10

STEP (4
,
2)

j O

STEP (4 , 3)
M

i·i
11

0 -
11

6 -
Elimation lllatrices

a I
-

I
①2
· 2

04

100
00 1
-

A
2

Echelon
E21
↓ form
-

Too

[]
1

o 2
-

z
O 1 O

O O 5
O
-
2 L -
-

Ezz U

AX = b

Esz (E2A)
= U
uX = C

(Es2E21) A U
=

EA = U

A = EU
---
Matrix Inverse

Inverses exist
only for square matrices
.e
i .
1 = 12

1
A"exists AA
-

their I AA
#
= =

If Matrix
a is invertible i.
.
e .
# "exists

We call A a
non-singular matrix
.

en/ A =

i 13

2 6
I p =

(3)
[28]x (3) =

#
co2

[13]
-

Tco 1

: =
(4) > XI

[ 3 :] +32]
-A

-
8-
Inverse
Finding the

Gauss-Jordan Method

A =

[] AA"
A .
X =
= I
b

I
A
is
goal to

I
our

I 13 ,
-
reduce

using row
A to I

operations
31
-

O
I

01 ! -
2 1

/-
-
-

"
3

oi
-
=
1
-

1 -2 1
0
-

-in
-
-
1
I A

Properties - 1
* 1 1
(B) (AB) I =

(A)
-
-

= BA
B =B
1
I

(ABC)" = c"BA

AT :
Transpose of Matrix .
A

-
g-
(AT)"
=
=
(A)
Matrices
Revisiting Elimination

(E32E21) A = U

A =
(EsE21)u
- 1 - 1

A =
E21 Esa U

reverses the
elimination (2 , 1)
Step

[si I
O

I
E =
-10 o

I
o
E32
=
O O
01
-

Is
0 O 0 -21
E =
-

ET I
O
1
O 0

-small example

ea/[4]
Ex
=
[i]
-
10-
E =
[ii]
[i] [ = ] =

Eu

[I
G

Es ↑
=

I
-10 8

31 O

O 2 1
-

~ stores all the


multiplies used in the

elimination
steps in reverse signs .

J provided that no row


exchanges
Permutation Matrix

-1
-
=
ex - 1 O
- What does P do ?

P = O O 1 row 2-1

G row 3- 2
I O
-

-
row 1 -> 3

property of a
permutation matrix-p-t = pT
I
reverses
the row
exchange

&
vector
spaces subspaces
· I

spanning
space
a Vectors V , va , Us Un
... -

the consists
span a
space ,
illeans
space
of all combinations of those vectors .

Basis for a vector is set of


space
a
-

with
vectors v Vz -- Un 2
properties :
-

independent
the
spor spece
.

-
12-
IRS one basis
(6)(p)(8)
has to be addition
A space led under
and subtraction .

subset of larger space


subspace
a
:

that contains the zeo vector

IR2 y
not a
y
a R &
subspece
ab
N

za
>
X 7 X
y
&

7X

Possible in IR2
All of IR2
subspaces
line through
Any
the origin .

8)
-3 -
Possible subspaces in IR3 -
All of IRS

Any plane
through the

origin
line
-
Any through
the origin
-

(8) vector

SUBSPACES OF A MATRIX

Column Space Denoted 2 (A)


:
by
C (A) : All linear combinations of columns
of Matrix .
A

is
-

I I 2 C (A) a
subspace
of 144
2 13
A =

!I
4x3
we
only have 2
independent column
-

vectors .

is within IR4
C (A) a
plane (IRY)

14-
-
Nullspace : Includes all the rectors that

satisfy A X 0
=
.

N(A) Mull
:

space .

If X exists (except X =
0) ,
then what

we about matrix .
A
can
say

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy