Section 38 The Matrix of a Linear Transformation
Focus Questions
By the end of this section, you should be able to give precise and thorough answers to the questions listed below. You may want to keep these questions in mind to focus your thoughts as you complete the section.
How do we represent a linear transformation from
to as a matrix transformation?How can we represent any linear transformation from a finite dimensional vector space
to a finite dimensional vector space as a matrix transformation?In what ways is representing a linear transformation as a matrix transformation useful?
Subsection Application: Secret Sharing Algorithms
Suppose we have a secret that we want or need to share with several individuals. For example, a bank manager might want to share pieces of the code for the bank vault with several employees so that if the manager is not available, some subset of these employees could open the vault if they work together. This allows for a significant amount of security while still making the code available if needed. As another example, in order to keep passwords secure (as they can be hard to remember), a person could implement a secret sharing scheme. The person would generate a set of shares for a given password and store them in several different places. If the person forgets the password, it can be reconstructed by collecting some set of these shares. Since the shares can be stored in many different places, the password is relatively secure. The idea behind secret sharing algorithms is to break a secret into a number (Subsection Introduction
A matrix transformationPreview Activity 38.1.
Let
(a)
Find
Use the fact that
(b)
Find
(c)
Find
(d)
Find
(e)
Is it possible to find a matrix
Subsection Linear Transformations from to
Preview Activity 38.1 illustrates the method for representing a linear transformation from Activity 38.2.
Let
in
is the matrix with columns
Definition 38.1.
If
with columns
Subsection The Matrix of a Linear Transformation
We saw in the previous section that any linear transformationActivity 38.3.
Let
for some scalars
(a)
What is
(b)
Note that for
(c)
Now find a matrix
Definition 38.2.
Let
Activity 38.4.
Let
(a)
Find the matrix
(b)
Find
(c)
Calculate
(d)
Find the matrix
Subsection A Connection between and a Matrix Representation of
Recall that we defined the kernel of a matrix transformation Activity 38.5.
Let
(a)
Show that if
Apply an appropriate coordinate transformation.
(b)
Let
Note that
Subsection Examples
What follows are worked examples that use the concepts from this section.Example 38.4.
Let
(a)
Show that
Solution.
Let
Now let
We conclude that
(b)
Let
Solution.
Recall that
The linear transformation
(c)
Use the matrix
Solution.
From part (b) we know that
If
Thus,
(d)
Let
Solution.
Recall that
(e)
Find
Solution.
To find
This makes
To check, using the definition of
Example 38.5.
Let
(a)
Let
Solution.
Let
Recall that the vectors of the form
(b)
If
Solution.
Let
So if we let
(c)
What can we conclude about the relationship between the vector spaces
Solution.
Since
When we connect the results of this example with the result of Exercise 5 in this section, we obtain a linear transformation analog of the Rank-Nullity Theorem. That is, if
Subsection Summary
-
The standard matrix for a linear transformation
from to is the matrixwhere
is the standard basis for Then is the matrix transformation defined by for all in -
Let
be an dimensional vector space and an dimensional vector space and suppose is a linear transformation. Let be a basis for and a basis for The matrix for with respect to the bases and is the matrixIf
and then we use the notation as a shorthand for The matrix has the property thatfor any
in The matrix for a linear transformation allows us to represent any linear transformation between finite dimensional vectors spaces as a matrix transformation. When we view a linear transformation
as a matrix transformation, we are able to use the matrix tools we have developed to understand
Exercises Exercises
1.
Let
(a)
Write the polynomial
(b)
Without doing any calculations, explain why
(c)
Without doing any calculations, explain why
(d)
Explicitly determine
(e)
Combine the results of parts (c) and (d) to find a matrix
(f)
Use the matrix
(g)
Calculate
2.
Let
(a)
The sum
for all
true or false? If true, prove the statement. If false, provide a counterexample.
(b)
The scalar multiple
for all
true or false? If true, prove the statement. If false, provide a counterexample.
3.
If
for all
(a)
Prove that
Use the linearity of both
(b)
Let
true or false? If true, prove the statement. If false, provide a counterexample.
4.
Let
(a)
Use the matrix
(b)
Since
whenever
(c)
Is the statement
true or false? If true, prove the statement. If false, provide a counterexample.
5.
Let
6.
Let
for all
7.
Let
(a)
Show that if
(b)
Let
(c)
Explain why the results of (a) and (b) show that
How do we tell if
8.
Our entire world is always in a state of motion. Much of this motion is vibration. When the vibrations of one object some into contact with the vibrations of another, the vibrations can be amplified. This is called resonance. Resonance appears in our lives every day, e.g., resonance is how food cooks in a microwave oven. A great example of resonance is the collapse of the Tacoma Narrows Bridge (just Google Tacoma Narrows Bridge to find some fascinating videos of this event). Resonance can be seen in mathematical models of vibrations. One such model is the second order differential equation
where
(a)
Show that
(b)
Show that
You might consider using the Wronskian.
(c)
Find the matrix of
(d)
Use the matrix to find all solutions to the equation
If
(e)
Sketch a few graphs of solutions to
9.
Label each of the following statements as True or False. Provide justification for your response.
(a) True/False.
If
(b) True/False.
If
(c) True/False.
If
(d) True/False.
If
(e) True/False.
Let
(f) True/False.
Let
(g) True/False.
Let
(h) True/False.
Let
(i) True/False.
Let
Subsection Project: Shamir's Secret Sharing and Lagrange Polynomials
Shamir's Secret Sharing is a secret sharing algorithm developed by the Israeli cryptographer Adi Shamir, who also contributed to the invention of RSA algorithm. The idea is to develop shares related to a secret code that can be distributed in such a way that the secret code can only be discovered if a fixed number of shareholders combine their information. The general algorithm for Shamir's Secret Sharing works by creating a polynomial with the secret code as one coefficient and random remaining coefficients. More specifically, to create aProject Activity 38.6.
It will be instructive to work in the most general setting. We restrict ourselves to the degree
(a)
Show that
(b)
Find the matrix for
(c)
Recall that the matrix
(d)
Given three points
Project Activity 38.7.
In this activity we see how to find the quadratic polynomials
(a)
Explain why the problem of solving the equations
(b)
Explain why we can solve the equations
all at once by solving the matrix equation
What does this tell us about the relationship between the matrix
(c)
Technology shows that
Use
(d)
Find similar expressions for
Project Activity 38.8.
Pick any three of the points
Project Activity 38.9.
The process described in Project Activity 38.7 for finding the Lagrange polynomials can be applied to any number of points. Let
(a)
Explain why
(b)
Explain why the polynomial
(c)
Let
Explain why
(d)
The previous part demonstrates that there is always a polynomial in