Let S = I + T*T: H rightarrow H, where T is linear and bounded. Show that S^-1: S(H)
rightarrow H exists.
Solution
T is a bounded linear operator. Hence, T*T is also a bounded linear operator as composition of
two bounded linear operator is a bounded linear operator.
I is the identity operator. Hence, it is bounded linear operator. So, S = I + T*T is a bounded
linear operator as sum of two bounded linear operator is a bounded linear operator.
Now, S : H --> H is a bounded linear operator.
The identity operator I : H --> H can be written as S-1S : H --> H as I = S-1S.
Let, h H. Then I(h) = h
This can be written as S-1S(h) = h
Or, S-1(S(h)) = h
As h H and S : H --> H is a bounded linear operator, S(h) S(H). Let S(h) = h1 S(H)
So, S-1(h1) = h where h H and h1 S(H)
As h is arbitrary, we can say that S-1 : S(H) --> H exists. Proved

More Related Content

PDF
It is a nanotechnology question. In which you are able to pick one m.pdf
PDF
I have this problem that I was given in class, but I cant for the .pdf
PDF
Implement this in Java Method to determine if a particular elemen.pdf
PDF
If an image is represented using 400 x 300 pixels and each pixel is .pdf
PDF
Implement the unsorted single linked list as we did in the class and .pdf
PDF
Hyposecretion of insulin is referred to as Type I diabetes insipidus.pdf
PDF
How are the forces of diffusion and electrical force responsible for.pdf
PDF
How does each of the differences between prokaryotes and eukaryotes .pdf
It is a nanotechnology question. In which you are able to pick one m.pdf
I have this problem that I was given in class, but I cant for the .pdf
Implement this in Java Method to determine if a particular elemen.pdf
If an image is represented using 400 x 300 pixels and each pixel is .pdf
Implement the unsorted single linked list as we did in the class and .pdf
Hyposecretion of insulin is referred to as Type I diabetes insipidus.pdf
How are the forces of diffusion and electrical force responsible for.pdf
How does each of the differences between prokaryotes and eukaryotes .pdf

More from arihantstoneart (20)

PDF
For MIMO system, (a) Please talk about the advantage and disadvantag.pdf
PDF
Explain why and give examples. In OO programming Polymorphism is on.pdf
PDF
Eukaryotic cells modify RNA after transcription What critical RNA pr.pdf
PDF
Driverimport java.util.Scanner;A class that keeps a f.pdf
PDF
Describe a data structure that supports both removeMin() and rem.pdf
PDF
Columbus Incorporated just paid $4.3 per share dividend yesterday (i.pdf
PDF
Anatomy Question Please Answer them all.A. Using a punnett square.pdf
PDF
A person is lost in the desert. (S)he has no water and after a coupl.pdf
PDF
2. Describe an advantage and a limitation to tracing ancestry with b.pdf
PDF
Write your thought on the following1. petroski notes that most en.pdf
PDF
You have two cell lines, a macrophage cell line and a CD4 T-cell lin.pdf
PDF
With X-linked inheritance, the X chromosome is transmitted in a diffe.pdf
PDF
When examining the central tendency of a probability distribution, u.pdf
PDF
What will organizations have to do to adapt to the influx of needed .pdf
PDF
What are the main functions of the components of prokaryotic vs. euk.pdf
PDF
There is a requirement to design a system to sense the presence of gl.pdf
PDF
1. What are the characteristics of financial assets that have highly.pdf
PDF
The tools that cyber criminals often use, including computer viruses.pdf
PDF
The Poisson distribution analysis can be used to calculate the titer.pdf
PDF
SaveI need help with this maze gui that I wrote in java, I am tryi.pdf
For MIMO system, (a) Please talk about the advantage and disadvantag.pdf
Explain why and give examples. In OO programming Polymorphism is on.pdf
Eukaryotic cells modify RNA after transcription What critical RNA pr.pdf
Driverimport java.util.Scanner;A class that keeps a f.pdf
Describe a data structure that supports both removeMin() and rem.pdf
Columbus Incorporated just paid $4.3 per share dividend yesterday (i.pdf
Anatomy Question Please Answer them all.A. Using a punnett square.pdf
A person is lost in the desert. (S)he has no water and after a coupl.pdf
2. Describe an advantage and a limitation to tracing ancestry with b.pdf
Write your thought on the following1. petroski notes that most en.pdf
You have two cell lines, a macrophage cell line and a CD4 T-cell lin.pdf
With X-linked inheritance, the X chromosome is transmitted in a diffe.pdf
When examining the central tendency of a probability distribution, u.pdf
What will organizations have to do to adapt to the influx of needed .pdf
What are the main functions of the components of prokaryotic vs. euk.pdf
There is a requirement to design a system to sense the presence of gl.pdf
1. What are the characteristics of financial assets that have highly.pdf
The tools that cyber criminals often use, including computer viruses.pdf
The Poisson distribution analysis can be used to calculate the titer.pdf
SaveI need help with this maze gui that I wrote in java, I am tryi.pdf
Ad

Recently uploaded (20)

PPTX
A powerpoint presentation on the Revised K-10 Science Shaping Paper
PDF
semiconductor packaging in vlsi design fab
PDF
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
PDF
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 2).pdf
PDF
What if we spent less time fighting change, and more time building what’s rig...
PDF
LIFE & LIVING TRILOGY - PART (3) REALITY & MYSTERY.pdf
PDF
My India Quiz Book_20210205121199924.pdf
PDF
Environmental Education MCQ BD2EE - Share Source.pdf
PPTX
Computer Architecture Input Output Memory.pptx
PPTX
Virtual and Augmented Reality in Current Scenario
PDF
LEARNERS WITH ADDITIONAL NEEDS ProfEd Topic
PDF
Empowerment Technology for Senior High School Guide
PDF
Complications of Minimal Access-Surgery.pdf
PDF
FORM 1 BIOLOGY MIND MAPS and their schemes
PDF
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
PPTX
Core Concepts of Personalized Learning and Virtual Learning Environments
PDF
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
PDF
Race Reva University – Shaping Future Leaders in Artificial Intelligence
PDF
Hazard Identification & Risk Assessment .pdf
PDF
FOISHS ANNUAL IMPLEMENTATION PLAN 2025.pdf
A powerpoint presentation on the Revised K-10 Science Shaping Paper
semiconductor packaging in vlsi design fab
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 2).pdf
What if we spent less time fighting change, and more time building what’s rig...
LIFE & LIVING TRILOGY - PART (3) REALITY & MYSTERY.pdf
My India Quiz Book_20210205121199924.pdf
Environmental Education MCQ BD2EE - Share Source.pdf
Computer Architecture Input Output Memory.pptx
Virtual and Augmented Reality in Current Scenario
LEARNERS WITH ADDITIONAL NEEDS ProfEd Topic
Empowerment Technology for Senior High School Guide
Complications of Minimal Access-Surgery.pdf
FORM 1 BIOLOGY MIND MAPS and their schemes
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
Core Concepts of Personalized Learning and Virtual Learning Environments
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
Race Reva University – Shaping Future Leaders in Artificial Intelligence
Hazard Identification & Risk Assessment .pdf
FOISHS ANNUAL IMPLEMENTATION PLAN 2025.pdf
Ad

Let S = I + TT H rightarrow H, where T is linear and bounded. Show.pdf

  • 1. Let S = I + T*T: H rightarrow H, where T is linear and bounded. Show that S^-1: S(H) rightarrow H exists. Solution T is a bounded linear operator. Hence, T*T is also a bounded linear operator as composition of two bounded linear operator is a bounded linear operator. I is the identity operator. Hence, it is bounded linear operator. So, S = I + T*T is a bounded linear operator as sum of two bounded linear operator is a bounded linear operator. Now, S : H --> H is a bounded linear operator. The identity operator I : H --> H can be written as S-1S : H --> H as I = S-1S. Let, h H. Then I(h) = h This can be written as S-1S(h) = h Or, S-1(S(h)) = h As h H and S : H --> H is a bounded linear operator, S(h) S(H). Let S(h) = h1 S(H) So, S-1(h1) = h where h H and h1 S(H) As h is arbitrary, we can say that S-1 : S(H) --> H exists. Proved