Nonstandard Analysis: a new way to compute Sam Sanders 1 Model - - PowerPoint PPT Presentation

nonstandard analysis a new way to compute
SMART_READER_LITE
LIVE PREVIEW

Nonstandard Analysis: a new way to compute Sam Sanders 1 Model - - PowerPoint PPT Presentation

Nonstandard Analysis: a new way to compute Sam Sanders 1 Model Theory and Proof Theory of Arithmetic A Memorial Conference in Honour of H. Kotlarski and Z. Ratajczyk July 25, 2012 1 This research is generously supported by the John Templeton


slide-1
SLIDE 1

Nonstandard Analysis: a new way to compute

Sam Sanders1

Model Theory and Proof Theory of Arithmetic

A Memorial Conference in Honour of H. Kotlarski and Z. Ratajczyk

July 25, 2012

1This research is generously supported by the John Templeton Foundation.

slide-2
SLIDE 2

Take-home message

slide-3
SLIDE 3

Take-home message

In Nonstandard Analysis, an algorithm is any object whose definition is independent of the choice of infinitesimal (Ω-invariance).

slide-4
SLIDE 4

Take-home message

In Nonstandard Analysis, an algorithm is any object whose definition is independent of the choice of infinitesimal (Ω-invariance).

More technically, we define a translation between Constructive Analysis (BISH) and Nonstandard Analysis (NSA):

slide-5
SLIDE 5

Take-home message

In Nonstandard Analysis, an algorithm is any object whose definition is independent of the choice of infinitesimal (Ω-invariance).

More technically, we define a translation between Constructive Analysis (BISH) and Nonstandard Analysis (NSA):

(Proof and Algorithm) in BISH = (Transfer and Ω-invariance) in NSA

slide-6
SLIDE 6

Take-home message

In Nonstandard Analysis, an algorithm is any object whose definition is independent of the choice of infinitesimal (Ω-invariance).

More technically, we define a translation between Constructive Analysis (BISH) and Nonstandard Analysis (NSA):

(Proof and Algorithm) in BISH = (Transfer and Ω-invariance) in NSA Most results from CRM (= RM based on BISH) translate to NSA under a natural translation B.

slide-7
SLIDE 7

Son of a. . .

INT CLASS RUSS

BISH

slide-8
SLIDE 8

Son of a. . .

INT CLASS RUSS

BISH ≈Math. programmable on TM

slide-9
SLIDE 9

Son of a. . .

INT CLASS RUSS

BISH ≈Math. programmable on TM LEM (P ∨ ¬P) Classical Math. ≈

slide-10
SLIDE 10

Son of a. . .

INT CLASS RUSS

BISH ≈Math. programmable on TM LEM (P ∨ ¬P) Classical Math. ≈

(proof by contradiction)

slide-11
SLIDE 11

Son of a. . .

INT CLASS RUSS

BISH ≈Math. programmable on TM LEM (P ∨ ¬P) Classical Math. ≈

(proof by contradiction)

≈Brouwer’s Intuitionistic Math.

slide-12
SLIDE 12

Son of a. . .

INT CLASS RUSS

BISH ≈Math. programmable on TM LEM (P ∨ ¬P) Classical Math. ≈

(proof by contradiction)

≈Brouwer’s Intuitionistic Math. MP

(¬¬P → P)

slide-13
SLIDE 13

Son of a. . .

INT CLASS RUSS

BISH ≈Math. programmable on TM LEM (P ∨ ¬P) Classical Math. ≈

(proof by contradiction)

≈Brouwer’s Intuitionistic Math. MP

(¬¬P → P)

CPF

slide-14
SLIDE 14

Son of a. . .

INT CLASS RUSS

BISH ≈Math. programmable on TM LEM (P ∨ ¬P) Classical Math. ≈

(proof by contradiction)

≈Brouwer’s Intuitionistic Math. MP

(¬¬P → P)

CPF CONT

slide-15
SLIDE 15

Son of a. . .

INT CLASS RUSS

BISH ≈Math. programmable on TM LEM (P ∨ ¬P) Classical Math. ≈

(proof by contradiction)

≈Brouwer’s Intuitionistic Math. MP

(¬¬P → P)

CPF CONT FAN

slide-16
SLIDE 16

Son of a. . .

INT CLASS RUSS

BISH ≈Math. programmable on TM LEM (P ∨ ¬P) Classical Math. ≈

(proof by contradiction)

≈Brouwer’s Intuitionistic Math. MP

(¬¬P → P)

CPF CONT FAN CONT′

slide-17
SLIDE 17

Son of a. . .

Errett Bishop’s Constructive Analysis (also ‘BISH’) is a constructive redevelopment of Mathematics, consistent with CLASS, RUSS and INT.

INT CLASS RUSS

BISH ≈Math. programmable on TM LEM (P ∨ ¬P) Classical Math. ≈ (proof by contradiction) ≈Brouwer’s Intuitionistic Math. MP

(¬¬P → P)

CPF CONT FAN CONT′

slide-18
SLIDE 18

Algorithm and Proof in Constructive Analysis

Errett Bishop’s Constructive Analysis (BISH) is a constructive redevelopment of Mathematics, where algorithm and proof are central.

slide-19
SLIDE 19

Algorithm and Proof in Constructive Analysis

Errett Bishop’s Constructive Analysis (BISH) is a constructive redevelopment of Mathematics, where algorithm and proof are central.

Definition (Logical connectives in BISH: BHK)

slide-20
SLIDE 20

Algorithm and Proof in Constructive Analysis

Errett Bishop’s Constructive Analysis (BISH) is a constructive redevelopment of Mathematics, where algorithm and proof are central.

Definition (Logical connectives in BISH: BHK)

1

P ∨ Q: we have an algorithm that outputs either P or Q, together with a proof of the chosen disjunct.

slide-21
SLIDE 21

Algorithm and Proof in Constructive Analysis

Errett Bishop’s Constructive Analysis (BISH) is a constructive redevelopment of Mathematics, where algorithm and proof are central.

Definition (Logical connectives in BISH: BHK)

1

P ∨ Q: we have an algorithm that outputs either P or Q, together with a proof of the chosen disjunct.

2

P ∧ Q: we have both a proof of P and a proof of Q.

slide-22
SLIDE 22

Algorithm and Proof in Constructive Analysis

Errett Bishop’s Constructive Analysis (BISH) is a constructive redevelopment of Mathematics, where algorithm and proof are central.

Definition (Logical connectives in BISH: BHK)

1

P ∨ Q: we have an algorithm that outputs either P or Q, together with a proof of the chosen disjunct.

2

P ∧ Q: we have both a proof of P and a proof of Q.

3

P → Q: by means of an algorithm we can convert any proof of P into a proof of Q.

slide-23
SLIDE 23

Algorithm and Proof in Constructive Analysis

Errett Bishop’s Constructive Analysis (BISH) is a constructive redevelopment of Mathematics, where algorithm and proof are central.

Definition (Logical connectives in BISH: BHK)

1

P ∨ Q: we have an algorithm that outputs either P or Q, together with a proof of the chosen disjunct.

2

P ∧ Q: we have both a proof of P and a proof of Q.

3

P → Q: by means of an algorithm we can convert any proof of P into a proof of Q.

4

¬P ≡ P → (0 = 1).

slide-24
SLIDE 24

Algorithm and Proof in Constructive Analysis

Errett Bishop’s Constructive Analysis (BISH) is a constructive redevelopment of Mathematics, where algorithm and proof are central.

Definition (Logical connectives in BISH: BHK)

1

P ∨ Q: we have an algorithm that outputs either P or Q, together with a proof of the chosen disjunct.

2

P ∧ Q: we have both a proof of P and a proof of Q.

3

P → Q: by means of an algorithm we can convert any proof of P into a proof of Q.

4

¬P ≡ P → (0 = 1).

5

(∃x)P(x): an algorithm computes an object x0 such that P(x0)

slide-25
SLIDE 25

Algorithm and Proof in Constructive Analysis

Errett Bishop’s Constructive Analysis (BISH) is a constructive redevelopment of Mathematics, where algorithm and proof are central.

Definition (Logical connectives in BISH: BHK)

1

P ∨ Q: we have an algorithm that outputs either P or Q, together with a proof of the chosen disjunct.

2

P ∧ Q: we have both a proof of P and a proof of Q.

3

P → Q: by means of an algorithm we can convert any proof of P into a proof of Q.

4

¬P ≡ P → (0 = 1).

5

(∃x)P(x): an algorithm computes an object x0 such that P(x0)

6

(∀x ∈ A)P(x): for all x, x ∈ A → P(x).

slide-26
SLIDE 26

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

From BISH to NSA

In BISH, proof and algorithm are central.

slide-27
SLIDE 27

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

From BISH to NSA

In BISH, proof and algorithm are central.

We define a system of Nonstandard Analyis NSA where Transfer (T) and Ω-invariant procedure play the same role.

slide-28
SLIDE 28

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

From BISH to NSA

In BISH, proof and algorithm are central.

We define a system of Nonstandard Analyis NSA where Transfer (T) and Ω-invariant procedure play the same role. NSA is similar to ∗RCA0, a nonstandard version of RCA0 (Keisler & Yokoyama).

slide-29
SLIDE 29

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

From BISH to NSA

In BISH, proof and algorithm are central.

We define a system of Nonstandard Analyis NSA where Transfer (T) and Ω-invariant procedure play the same role. NSA is similar to ∗RCA0, a nonstandard version of RCA0 (Keisler & Yokoyama).

Three important features:

slide-30
SLIDE 30

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

From BISH to NSA

In BISH, proof and algorithm are central.

We define a system of Nonstandard Analyis NSA where Transfer (T) and Ω-invariant procedure play the same role. NSA is similar to ∗RCA0, a nonstandard version of RCA0 (Keisler & Yokoyama).

Three important features:

1 No Transfer Principle, except for ∆0.

slide-31
SLIDE 31

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

From BISH to NSA

In BISH, proof and algorithm are central.

We define a system of Nonstandard Analyis NSA where Transfer (T) and Ω-invariant procedure play the same role. NSA is similar to ∗RCA0, a nonstandard version of RCA0 (Keisler & Yokoyama).

Three important features:

1 No Transfer Principle, except for ∆0. 2 No ∆0

1-CA, but Ω-CA. (CA for Ω-invariant formulas)

slide-32
SLIDE 32

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

From BISH to NSA

In BISH, proof and algorithm are central.

We define a system of Nonstandard Analyis NSA where Transfer (T) and Ω-invariant procedure play the same role. NSA is similar to ∗RCA0, a nonstandard version of RCA0 (Keisler & Yokoyama).

Three important features:

1 No Transfer Principle, except for ∆0. 2 No ∆0

1-CA, but Ω-CA. (CA for Ω-invariant formulas)

3 Levels of infinity (Stratified NSA).

slide-33
SLIDE 33

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Feature 3: Stratified Nonstandard Analysis

slide-34
SLIDE 34

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Feature 3: Stratified Nonstandard Analysis

The usual picture of ∗N:

∗N, the hypernatural numbers

  • . . .

ω2 . . . ωk . . .

ω1 0 1 . . .

  • N, the natural/finite numbers
  • Ω = ∗N \ N, the infinite numbers
slide-35
SLIDE 35

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Feature 3: Stratified Nonstandard Analysis

The usual picture of ∗N:

∗N, the hypernatural numbers

  • . . .

ω2 . . . ωk . . .

ω1 0 1 . . .

  • N, the natural/finite numbers
  • Ω = ∗N \ N, the infinite numbers

In NSA, the infinite numbers are split into ‘small’ and ‘large’.

slide-36
SLIDE 36

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Feature 3: Stratified Nonstandard Analysis

The usual picture of ∗N:

∗N, the hypernatural numbers

  • . . .

ω2 . . . ωk . . .

ω1 0 1 . . .

  • N, the natural/finite numbers
  • Ω = ∗N \ N, the infinite numbers

In NSA, the infinite numbers are split into ‘small’ and ‘large’.

the small infinite numbers

  • the large infinite numbers
slide-37
SLIDE 37

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Feature 3: Stratified Nonstandard Analysis

The usual picture of ∗N:

∗N, the hypernatural numbers

  • . . .

ω2 . . . ωk . . .

ω1 0 1 . . .

  • N, the natural/finite numbers
  • Ω = ∗N \ N, the infinite numbers

In NSA, the infinite numbers are split into ‘small’ and ‘large’.

N1=N ∪ the small infinite numbers

  • Ω1=∗N\N1, the large infinite numbers
slide-38
SLIDE 38

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Feature 2: Ω-invariance

slide-39
SLIDE 39

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Feature 2: Ω-invariance

Ω-invariance ≈ algorithm ≈ finite procedure

Definition (Ω-invariance)

For ψ(n, m) ∈ ∆0 and ω ∈ Ω, the formula ψ(n, ω) is Ω-invariant if

slide-40
SLIDE 40

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Feature 2: Ω-invariance

Ω-invariance ≈ algorithm ≈ finite procedure

Definition (Ω-invariance)

For ψ(n, m) ∈ ∆0 and ω ∈ Ω, the formula ψ(n, ω) is Ω-invariant if (∀n ∈ N)(∀ω′ ∈ Ω)[ψ(n, ω) ↔ ψ(n, ω′)].

slide-41
SLIDE 41

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Feature 2: Ω-invariance

Ω-invariance ≈ algorithm ≈ finite procedure

Definition (Ω-invariance)

For ψ(n, m) ∈ ∆0 and ω ∈ Ω, the formula ψ(n, ω) is Ω-invariant if (∀n ∈ N)(∀ω′ ∈ Ω)[ψ(n, ω) ↔ ψ(n, ω′)].

Note that ψ(n, ω) depends on ω ∈ Ω, but not on the choice of ω ∈ Ω.

slide-42
SLIDE 42

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Feature 2: Ω-invariance

Ω-invariance ≈ algorithm ≈ finite procedure

Definition (Ω-invariance)

For ψ(n, m) ∈ ∆0 and ω ∈ Ω, the formula ψ(n, ω) is Ω-invariant if (∀n ∈ N)(∀ω′ ∈ Ω)[ψ(n, ω) ↔ ψ(n, ω′)].

Note that ψ(n, ω) depends on ω ∈ Ω, but not on the choice of ω ∈ Ω.

NSA has Ω-CA instead of ∆1-CA.

Principle (Ω-CA)

For all Ω-invariant ψ(n, ω), we have (∃X ⊂ N)(∀n ∈ N)(n ∈ X ↔ ψ(n, ω)).

slide-43
SLIDE 43

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

The translation B from BISH to NSA

slide-44
SLIDE 44

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

The translation B from BISH to NSA

BISH (based on BHK)

slide-45
SLIDE 45

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

The translation B from BISH to NSA

BISH (based on BHK) NSA (based on CL)

slide-46
SLIDE 46

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

The translation B from BISH to NSA

BISH (based on BHK) NSA (based on CL)

Central: algorithm and proof

slide-47
SLIDE 47

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

The translation B from BISH to NSA

BISH (based on BHK) NSA (based on CL)

Central: algorithm and proof A ∨ B:

an algo yields a proof of A or of B

slide-48
SLIDE 48

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

The translation B from BISH to NSA

BISH (based on BHK) NSA (based on CL)

Central: algorithm and proof A ∨ B:

an algo yields a proof of A or of B Central: Ω-invariance and Transfer (T)

slide-49
SLIDE 49

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

The translation B from BISH to NSA

BISH (based on BHK) NSA (based on CL)

Central: algorithm and proof A ∨ B:

an algo yields a proof of A or of B Central: Ω-invariance and Transfer (T)

A V B:

slide-50
SLIDE 50

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

The translation B from BISH to NSA

BISH (based on BHK) NSA (based on CL)

Central: algorithm and proof A ∨ B:

an algo yields a proof of A or of B Central: Ω-invariance and Transfer (T)

A V B: There is Ω-invariant ψ( x, ω) s.t. ψ( x, ω) → [A( x) ∧ [A( x) ∈ T]] ∧ ¬ψ( x, ω) → [B( x) ∧ [B( x) ∈ T]]

slide-51
SLIDE 51

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

The translation B from BISH to NSA

BISH (based on BHK) NSA (based on CL)

Central: algorithm and proof A ∨ B:

an algo yields a proof of A or of B Central: Ω-invariance and Transfer (T)

A V B: There is Ω-invariant ψ( x, ω) s.t. ψ( x, ω) → [A( x) ∧ [A( x) ∈ T]] ∧ ¬ψ( x, ω) → [B( x) ∧ [B( x) ∈ T]] A → B: an algo converts a proof of A to a proof of B

slide-52
SLIDE 52

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

The translation B from BISH to NSA

BISH (based on BHK) NSA (based on CL)

Central: algorithm and proof A ∨ B:

an algo yields a proof of A or of B Central: Ω-invariance and Transfer (T)

A V B: There is Ω-invariant ψ( x, ω) s.t. ψ( x, ω) → [A( x) ∧ [A( x) ∈ T]] ∧ ¬ψ( x, ω) → [B( x) ∧ [B( x) ∈ T]] A → B: an algo converts a proof of A to a proof of B A ⇛ B:

  • A ∧ [A ∈ T]
  • B ∧ [B ∈ T]
slide-53
SLIDE 53

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

The translation B from BISH to NSA

BISH (based on BHK) NSA (based on CL)

Central: algorithm and proof A ∨ B:

an algo yields a proof of A or of B Central: Ω-invariance and Transfer (T)

A V B: There is Ω-invariant ψ( x, ω) s.t. ψ( x, ω) → [A( x) ∧ [A( x) ∈ T]] ∧ ¬ψ( x, ω) → [B( x) ∧ [B( x) ∈ T]] A → B: an algo converts a proof of A to a proof of B A ⇛ B:

  • A ∧ [A ∈ T]
  • B ∧ [B ∈ T]
  • ‘A ∈ T’ means ‘A satisfies Transfer’.
slide-54
SLIDE 54

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

The translation B from BISH to NSA

BISH (based on BHK) NSA (based on CL)

Central: algorithm and proof A ∨ B:

an algo yields a proof of A or of B Central: Ω-invariance and Transfer (T)

A V B: There is Ω-invariant ψ( x, ω) s.t. ψ( x, ω) → [A( x) ∧ [A( x) ∈ T]] ∧ ¬ψ( x, ω) → [B( x) ∧ [B( x) ∈ T]] A → B: an algo converts a proof of A to a proof of B A ⇛ B:

  • A ∧ [A ∈ T]
  • B ∧ [B ∈ T]
  • ‘A ∈ T’ means ‘A satisfies Transfer’.

E.g. ‘(∀n ∈ N)ϕ(n) ∈ T’ is [(∀n ∈ N)ϕ(n) → (∀n ∈ ∗N)ϕ(n)]

slide-55
SLIDE 55

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

The translation B from BISH to NSA

BISH (based on BHK) NSA (based on CL)

Central: algorithm and proof A ∨ B:

an algo yields a proof of A or of B Central: Ω-invariance and Transfer (T)

A V B: There is Ω-invariant ψ( x, ω) s.t. ψ( x, ω) → [A( x) ∧ [A( x) ∈ T]] ∧ ¬ψ( x, ω) → [B( x) ∧ [B( x) ∈ T]] A → B: an algo converts a proof of A to a proof of B A ⇛ B:

  • A ∧ [A ∈ T]
  • B ∧ [B ∈ T]
  • ‘A ∈ T’ means ‘A satisfies Transfer’.

E.g. ‘(∀n ∈ N)ϕ(n) ∈ T’ is [(∀n ∈ N)ϕ(n) → (∀n ∈ ∗N)ϕ(n)] E.g. ‘(∃n ∈ ∗N)ϕ(n) ∈ T’ is [(∃n ∈ ∗N)ϕ(n) → (∃n ∈ N1)ϕ(n)]

slide-56
SLIDE 56

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

The translation B from BISH to NSA

BISH (based on BHK) NSA (based on CL)

Central: algorithm and proof A ∨ B:

an algo yields a proof of A or of B Central: Ω-invariance and Transfer (T)

A V B: There is Ω-invariant ψ( x, ω) s.t. ψ( x, ω) → [A( x) ∧ [A( x) ∈ T]] ∧ ¬ψ( x, ω) → [B( x) ∧ [B( x) ∈ T]] A → B: an algo converts a proof of A to a proof of B A ⇛ B:

  • A ∧ [A ∈ T]
  • B ∧ [B ∈ T]
  • ¬A: A → (0 = 1)
slide-57
SLIDE 57

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

The translation B from BISH to NSA

BISH (based on BHK) NSA (based on CL)

Central: algorithm and proof A ∨ B:

an algo yields a proof of A or of B Central: Ω-invariance and Transfer (T)

A V B: There is Ω-invariant ψ( x, ω) s.t. ψ( x, ω) → [A( x) ∧ [A( x) ∈ T]] ∧ ¬ψ( x, ω) → [B( x) ∧ [B( x) ∈ T]] A → B: an algo converts a proof of A to a proof of B A ⇛ B:

  • A ∧ [A ∈ T]
  • B ∧ [B ∈ T]
  • ¬A: A → (0 = 1)

∼A: A ⇛ (0 = 1)

slide-58
SLIDE 58

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

The translation B from BISH to NSA

BISH (based on BHK) NSA (based on CL)

Central: algorithm and proof A ∨ B:

an algo yields a proof of A or of B Central: Ω-invariance and Transfer (T)

A V B: There is Ω-invariant ψ( x, ω) s.t. ψ( x, ω) → [A( x) ∧ [A( x) ∈ T]] ∧ ¬ψ( x, ω) → [B( x) ∧ [B( x) ∈ T]] A → B: an algo converts a proof of A to a proof of B A ⇛ B:

  • A ∧ [A ∈ T]
  • B ∧ [B ∈ T]
  • ¬A: A → (0 = 1)

∼A: A ⇛ (0 = 1)

(∃x)A(x): an algo computes x0 such that A(x0)

slide-59
SLIDE 59

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

The translation B from BISH to NSA

BISH (based on BHK) NSA (based on CL)

Central: algorithm and proof A ∨ B:

an algo yields a proof of A or of B Central: Ω-invariance and Transfer (T)

A V B: There is Ω-invariant ψ( x, ω) s.t. ψ( x, ω) → [A( x) ∧ [A( x) ∈ T]] ∧ ¬ψ( x, ω) → [B( x) ∧ [B( x) ∈ T]] A → B: an algo converts a proof of A to a proof of B A ⇛ B:

  • A ∧ [A ∈ T]
  • B ∧ [B ∈ T]
  • ¬A: A → (0 = 1)

∼A: A ⇛ (0 = 1)

(∃x)A(x): an algo computes x0 such that A(x0) (∃x)A(x): “an Ω-inv. proc. computes x0 such that A(x0)”

slide-60
SLIDE 60

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

The translation B from BISH to NSA

BISH (based on BHK) NSA (based on CL)

Central: algorithm and proof A ∨ B:

an algo yields a proof of A or of B Central: Ω-invariance and Transfer (T)

A V B: There is Ω-invariant ψ( x, ω) s.t. ψ( x, ω) → [A( x) ∧ [A( x) ∈ T]] ∧ ¬ψ( x, ω) → [B( x) ∧ [B( x) ∈ T]] A → B: an algo converts a proof of A to a proof of B A ⇛ B:

  • A ∧ [A ∈ T]
  • B ∧ [B ∈ T]
  • ¬A: A → (0 = 1)

∼A: A ⇛ (0 = 1)

(∃x)A(x): an algo computes x0 such that A(x0) (∃x)A(x): “an Ω-inv. proc. computes x0 such that A(x0)”

∼[(∀n ∈ N)A(n)]

slide-61
SLIDE 61

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

The translation B from BISH to NSA

BISH (based on BHK) NSA (based on CL)

Central: algorithm and proof A ∨ B:

an algo yields a proof of A or of B Central: Ω-invariance and Transfer (T)

A V B: There is Ω-invariant ψ( x, ω) s.t. ψ( x, ω) → [A( x) ∧ [A( x) ∈ T]] ∧ ¬ψ( x, ω) → [B( x) ∧ [B( x) ∈ T]] A → B: an algo converts a proof of A to a proof of B A ⇛ B:

  • A ∧ [A ∈ T]
  • B ∧ [B ∈ T]
  • ¬A: A → (0 = 1)

∼A: A ⇛ (0 = 1)

(∃x)A(x): an algo computes x0 such that A(x0) (∃x)A(x): “an Ω-inv. proc. computes x0 such that A(x0)”

∼[(∀n ∈ N)A(n)] ≡ (∃n ∈ N1)∼A(n) WEAKER than (∃n ∈ N)∼A(n).

slide-62
SLIDE 62

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

The translation B from BISH to NSA

BISH (based on BHK) NSA (based on CL)

Central: algorithm and proof A ∨ B:

an algo yields a proof of A or of B Central: Ω-invariance and Transfer (T)

A V B: There is Ω-invariant ψ( x, ω) s.t. ψ( x, ω) → [A( x) ∧ [A( x) ∈ T]] ∧ ¬ψ( x, ω) → [B( x) ∧ [B( x) ∈ T]] A → B: an algo converts a proof of A to a proof of B A ⇛ B:

  • A ∧ [A ∈ T]
  • B ∧ [B ∈ T]
  • ¬A: A → (0 = 1)

∼A: A ⇛ (0 = 1)

(∃x)A(x): an algo computes x0 such that A(x0) (∃x)A(x): “an Ω-inv. proc. computes x0 such that A(x0)”

∼[(∀n ∈ N)A(n)] ≡ (∃n ∈ N1)∼A(n) WEAKER than (∃n ∈ N)∼A(n). ¬[(∀n ∈ N)A(n)] is WEAKER than (∃n ∈ N)¬A(n).

slide-63
SLIDE 63

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

The translation B from BISH to NSA

BISH (based on BHK) NSA (based on CL)

Central: algorithm and proof A ∨ B:

an algo yields a proof of A or of B Central: Ω-invariance and Transfer (T)

A V B: There is Ω-invariant ψ( x, ω) s.t. ψ( x, ω) → [A( x) ∧ [A( x) ∈ T]] ∧ ¬ψ( x, ω) → [B( x) ∧ [B( x) ∈ T]] A → B: an algo converts a proof of A to a proof of B A ⇛ B:

  • A ∧ [A ∈ T]
  • B ∧ [B ∈ T]
  • ¬A: A → (0 = 1)

∼A: A ⇛ (0 = 1)

(∃x)A(x): an algo computes x0 such that A(x0) (∃x)A(x): “an Ω-inv. proc. computes x0 such that A(x0)”

We know: If BISH ⊢ X then X→LPO, LLPO, MP, . . . (princ. rejected in BISH)

slide-64
SLIDE 64

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

The translation B from BISH to NSA

BISH (based on BHK) NSA (based on CL)

Central: algorithm and proof A ∨ B:

an algo yields a proof of A or of B Central: Ω-invariance and Transfer (T)

A V B: There is Ω-invariant ψ( x, ω) s.t. ψ( x, ω) → [A( x) ∧ [A( x) ∈ T]] ∧ ¬ψ( x, ω) → [B( x) ∧ [B( x) ∈ T]] A → B: an algo converts a proof of A to a proof of B A ⇛ B:

  • A ∧ [A ∈ T]
  • B ∧ [B ∈ T]
  • ¬A: A → (0 = 1)

∼A: A ⇛ (0 = 1)

(∃x)A(x): an algo computes x0 such that A(x0) (∃x)A(x): “an Ω-inv. proc. computes x0 such that A(x0)”

We know: If BISH ⊢ X then X→LPO, LLPO, MP, . . . (princ. rejected in BISH) We show: If NSA ⊢ Y then Y ⇛ LPO, LLPO, MP, . . .

slide-65
SLIDE 65

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

The translation B from BISH to NSA

BISH (based on BHK) NSA (based on CL)

Central: algorithm and proof A ∨ B:

an algo yields a proof of A or of B Central: Ω-invariance and Transfer (T)

A V B: There is Ω-invariant ψ( x, ω) s.t. ψ( x, ω) → [A( x) ∧ [A( x) ∈ T]] ∧ ¬ψ( x, ω) → [B( x) ∧ [B( x) ∈ T]] A → B: an algo converts a proof of A to a proof of B A ⇛ B:

  • A ∧ [A ∈ T]
  • B ∧ [B ∈ T]
  • ¬A: A → (0 = 1)

∼A: A ⇛ (0 = 1)

(∃x)A(x): an algo computes x0 such that A(x0) (∃x)A(x): “an Ω-inv. proc. computes x0 such that A(x0)”

We know: If BISH ⊢ X then X→LPO, LLPO, MP, . . . (princ. rejected in BISH) We show: If NSA ⊢ Y then Y ⇛ LPO, LLPO, MP, . . . (e.g. LPO is B(LPO), unprovable in NSA

slide-66
SLIDE 66

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Constructive Reverse Mathematics under B

slide-67
SLIDE 67

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Constructive Reverse Mathematics under B

BISH (based on BHK) NSA (based on CL) non-constructive/non-algorithmic

slide-68
SLIDE 68

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Constructive Reverse Mathematics under B

BISH (based on BHK) NSA (based on CL) non-constructive/non-algorithmic LPO: For P ∈ Σ1, P ∨ ¬P

slide-69
SLIDE 69

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Constructive Reverse Mathematics under B

BISH (based on BHK) NSA (based on CL) non-constructive/non-algorithmic LPO: For P ∈ Σ1, P ∨ ¬P

  • LPR: (∀x ∈ R)(x > 0 ∨ ¬(x > 0))
slide-70
SLIDE 70

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Constructive Reverse Mathematics under B

BISH (based on BHK) NSA (based on CL) non-constructive/non-algorithmic LPO: For P ∈ Σ1, P ∨ ¬P

  • LPR: (∀x ∈ R)(x > 0 ∨ ¬(x > 0))
  • MCT: monotone convergence thm
slide-71
SLIDE 71

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Constructive Reverse Mathematics under B

BISH (based on BHK) NSA (based on CL) non-constructive/non-algorithmic LPO: For P ∈ Σ1, P ∨ ¬P

  • LPR: (∀x ∈ R)(x > 0 ∨ ¬(x > 0))
  • MCT: monotone convergence thm
  • CIT: Cantor intersection thm
slide-72
SLIDE 72

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Constructive Reverse Mathematics under B

BISH (based on BHK) NSA (based on CL) non-constructive/non-algorithmic LPO: For P ∈ Σ1, P ∨ ¬P

  • LPR: (∀x ∈ R)(x > 0 ∨ ¬(x > 0))
  • MCT: monotone convergence thm
  • CIT: Cantor intersection thm

non-Ω-invariant

slide-73
SLIDE 73

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Constructive Reverse Mathematics under B

BISH (based on BHK) NSA (based on CL) non-constructive/non-algorithmic LPO: For P ∈ Σ1, P ∨ ¬P

  • LPR: (∀x ∈ R)(x > 0 ∨ ¬(x > 0))
  • MCT: monotone convergence thm
  • CIT: Cantor intersection thm

non-Ω-invariant LPO: For P ∈ Σ1, P V ∼P ⇚ ⇛

slide-74
SLIDE 74

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Constructive Reverse Mathematics under B

BISH (based on BHK) NSA (based on CL) non-constructive/non-algorithmic LPO: For P ∈ Σ1, P ∨ ¬P

  • LPR: (∀x ∈ R)(x > 0 ∨ ¬(x > 0))
  • MCT: monotone convergence thm
  • CIT: Cantor intersection thm

non-Ω-invariant LPO: For P ∈ Σ1, P V ∼P ⇚ ⇛ LPR: (∀x ∈ R)(x > 0 V ∼(x > 0)) ⇚ ⇛

slide-75
SLIDE 75

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Constructive Reverse Mathematics under B

BISH (based on BHK) NSA (based on CL) non-constructive/non-algorithmic LPO: For P ∈ Σ1, P ∨ ¬P

  • LPR: (∀x ∈ R)(x > 0 ∨ ¬(x > 0))
  • MCT: monotone convergence thm
  • CIT: Cantor intersection thm

non-Ω-invariant LPO: For P ∈ Σ1, P V ∼P ⇚ ⇛ LPR: (∀x ∈ R)(x > 0 V ∼(x > 0)) ⇚ ⇛ MCT: monotone convergence thm ⇚ ⇛

slide-76
SLIDE 76

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Constructive Reverse Mathematics under B

BISH (based on BHK) NSA (based on CL) non-constructive/non-algorithmic LPO: For P ∈ Σ1, P ∨ ¬P

  • LPR: (∀x ∈ R)(x > 0 ∨ ¬(x > 0))
  • MCT: monotone convergence thm
  • CIT: Cantor intersection thm

non-Ω-invariant LPO: For P ∈ Σ1, P V ∼P ⇚ ⇛ LPR: (∀x ∈ R)(x > 0 V ∼(x > 0)) ⇚ ⇛ MCT: monotone convergence thm ⇚ ⇛ CIT: Cantor intersection thm

slide-77
SLIDE 77

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Constructive Reverse Mathematics under B

BISH (based on BHK) NSA (based on CL) non-constructive/non-algorithmic LPO: For P ∈ Σ1, P ∨ ¬P

  • LPR: (∀x ∈ R)(x > 0 ∨ ¬(x > 0))
  • MCT: monotone convergence thm
  • CIT: Cantor intersection thm

non-Ω-invariant LPO: For P ∈ Σ1, P V ∼P ⇚ ⇛ LPR: (∀x ∈ R)(x > 0 V ∼(x > 0)) ⇚ ⇛ MCT: monotone convergence thm ⇚ ⇛ CIT: Cantor intersection thm (limit computed by algo)

slide-78
SLIDE 78

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Constructive Reverse Mathematics under B

BISH (based on BHK) NSA (based on CL) non-constructive/non-algorithmic LPO: For P ∈ Σ1, P ∨ ¬P

  • LPR: (∀x ∈ R)(x > 0 ∨ ¬(x > 0))
  • MCT: monotone convergence thm
  • CIT: Cantor intersection thm

non-Ω-invariant LPO: For P ∈ Σ1, P V ∼P ⇚ ⇛ LPR: (∀x ∈ R)(x > 0 V ∼(x > 0)) ⇚ ⇛ MCT: monotone convergence thm ⇚ ⇛ CIT: Cantor intersection thm (limit computed by algo) (limit computed by Ω-inv. proc.)

slide-79
SLIDE 79

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Constructive Reverse Mathematics under B

BISH (based on BHK) NSA (based on CL) non-constructive/non-algorithmic LPO: For P ∈ Σ1, P ∨ ¬P

  • LPR: (∀x ∈ R)(x > 0 ∨ ¬(x > 0))
  • MCT: monotone convergence thm
  • CIT: Cantor intersection thm

non-Ω-invariant LPO: For P ∈ Σ1, P V ∼P ⇚ ⇛ LPR: (∀x ∈ R)(x > 0 V ∼(x > 0)) ⇚ ⇛ MCT: monotone convergence thm ⇚ ⇛ CIT: Cantor intersection thm (limit computed by algo) (limit computed by Ω-inv. proc.) (point in intersection computed by algo)

slide-80
SLIDE 80

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Constructive Reverse Mathematics under B

BISH (based on BHK) NSA (based on CL) non-constructive/non-algorithmic LPO: For P ∈ Σ1, P ∨ ¬P

  • LPR: (∀x ∈ R)(x > 0 ∨ ¬(x > 0))
  • MCT: monotone convergence thm
  • CIT: Cantor intersection thm

non-Ω-invariant LPO: For P ∈ Σ1, P V ∼P ⇚ ⇛ LPR: (∀x ∈ R)(x > 0 V ∼(x > 0)) ⇚ ⇛ MCT: monotone convergence thm ⇚ ⇛ CIT: Cantor intersection thm (limit computed by algo) (limit computed by Ω-inv. proc.) (point in intersection computed by algo) (point in intersection computed by Ω-inv. proc.)

slide-81
SLIDE 81

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Constructive Reverse Mathematics under B

BISH (based on BHK) NSA (based on CL) non-constructive/non-algorithmic LPO: For P ∈ Σ1, P ∨ ¬P

  • LPR: (∀x ∈ R)(x > 0 ∨ ¬(x > 0))
  • MCT: monotone convergence thm
  • CIT: Cantor intersection thm

non-Ω-invariant LPO: For P ∈ Σ1, P V ∼P ⇚ ⇛ LPR: (∀x ∈ R)(x > 0 V ∼(x > 0)) ⇚ ⇛ MCT: monotone convergence thm ⇚ ⇛ CIT: Cantor intersection thm (limit computed by algo) (limit computed by Ω-inv. proc.) ⇚ ⇛ Universal Transfer: For all ϕ ∈ ∆0 (∀n ∈ N)ϕ(n) → (∀n ∈ ∗N)ϕ(n)

slide-82
SLIDE 82

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Constructive Reverse Mathematics under B

BISH (based on BHK) NSA (based on CL) non-constructive/non-algorithmic LPO: For P ∈ Σ1, P ∨ ¬P

  • LPR: (∀x ∈ R)(x > 0 ∨ ¬(x > 0))
  • MCT: monotone convergence thm
  • CIT: Cantor intersection thm

non-Ω-invariant LPO: For P ∈ Σ1, P V ∼P ⇚ ⇛ LPR: (∀x ∈ R)(x > 0 V ∼(x > 0)) ⇚ ⇛ MCT: monotone convergence thm ⇚ ⇛ CIT: Cantor intersection thm (limit computed by algo) (limit computed by Ω-inv. proc.) ⇚ ⇛ Universal Transfer: For all ϕ ∈ ∆0 (∀n ∈ N)ϕ(n) → (∀n ∈ ∗N)ϕ(n) NSA does prove (∀δ ∈ R)

  • δ > 0 ⇛ (x > 0) V(x < δ)
  • .

BISH does prove (∀δ ∈ R)

  • δ > 0 → (x > 0) ∨ (x < δ)
  • .
slide-83
SLIDE 83

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Constructive Reverse Mathematics under B II

slide-84
SLIDE 84

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Constructive Reverse Mathematics under B II

BISH (based on BHK) NSA (based on CL) non-constructive/non-algorithmic

slide-85
SLIDE 85

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Constructive Reverse Mathematics under B II

BISH (based on BHK) NSA (based on CL) non-constructive/non-algorithmic LLPO

For P, Q ∈ Σ1, ¬(P ∧ Q) → ¬P ∨ ¬Q

slide-86
SLIDE 86

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Constructive Reverse Mathematics under B II

BISH (based on BHK) NSA (based on CL) non-constructive/non-algorithmic LLPO

For P, Q ∈ Σ1, ¬(P ∧ Q) → ¬P ∨ ¬Q

  • LLPR: (∀x ∈ R)(x ≥ 0 ∨ x ≤ 0)
slide-87
SLIDE 87

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Constructive Reverse Mathematics under B II

BISH (based on BHK) NSA (based on CL) non-constructive/non-algorithmic LLPO

For P, Q ∈ Σ1, ¬(P ∧ Q) → ¬P ∨ ¬Q

  • LLPR: (∀x ∈ R)(x ≥ 0 ∨ x ≤ 0)
  • NIL

(∀x, y ∈ R)(xy = 0 → x = 0 ∨ y = 0)

slide-88
SLIDE 88

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Constructive Reverse Mathematics under B II

BISH (based on BHK) NSA (based on CL) non-constructive/non-algorithmic LLPO

For P, Q ∈ Σ1, ¬(P ∧ Q) → ¬P ∨ ¬Q

  • LLPR: (∀x ∈ R)(x ≥ 0 ∨ x ≤ 0)
  • NIL

(∀x, y ∈ R)(xy = 0 → x = 0 ∨ y = 0)

  • IVT: Intermediate value theorem
slide-89
SLIDE 89

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Constructive Reverse Mathematics under B II

BISH (based on BHK) NSA (based on CL) non-constructive/non-algorithmic LLPO

For P, Q ∈ Σ1, ¬(P ∧ Q) → ¬P ∨ ¬Q

  • LLPR: (∀x ∈ R)(x ≥ 0 ∨ x ≤ 0)
  • NIL

(∀x, y ∈ R)(xy = 0 → x = 0 ∨ y = 0)

  • IVT: Intermediate value theorem

non-Ω-invariant

slide-90
SLIDE 90

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Constructive Reverse Mathematics under B II

BISH (based on BHK) NSA (based on CL) non-constructive/non-algorithmic LLPO

For P, Q ∈ Σ1, ¬(P ∧ Q) → ¬P ∨ ¬Q

  • LLPR: (∀x ∈ R)(x ≥ 0 ∨ x ≤ 0)
  • NIL

(∀x, y ∈ R)(xy = 0 → x = 0 ∨ y = 0)

  • IVT: Intermediate value theorem

non-Ω-invariant LLPO

For P, Q ∈ Σ1, ∼(P ∧ Q) ⇛ ∼P V ∼Q

⇚ ⇛

slide-91
SLIDE 91

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Constructive Reverse Mathematics under B II

BISH (based on BHK) NSA (based on CL) non-constructive/non-algorithmic LLPO

For P, Q ∈ Σ1, ¬(P ∧ Q) → ¬P ∨ ¬Q

  • LLPR: (∀x ∈ R)(x ≥ 0 ∨ x ≤ 0)
  • NIL

(∀x, y ∈ R)(xy = 0 → x = 0 ∨ y = 0)

  • IVT: Intermediate value theorem

non-Ω-invariant LLPO

For P, Q ∈ Σ1, ∼(P ∧ Q) ⇛ ∼P V ∼Q

⇚ ⇛ LLPR: (∀x ∈ R)(x ≥ 0 V x ≤ 0) ⇚ ⇛

slide-92
SLIDE 92

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Constructive Reverse Mathematics under B II

BISH (based on BHK) NSA (based on CL) non-constructive/non-algorithmic LLPO

For P, Q ∈ Σ1, ¬(P ∧ Q) → ¬P ∨ ¬Q

  • LLPR: (∀x ∈ R)(x ≥ 0 ∨ x ≤ 0)
  • NIL

(∀x, y ∈ R)(xy = 0 → x = 0 ∨ y = 0)

  • IVT: Intermediate value theorem

non-Ω-invariant LLPO

For P, Q ∈ Σ1, ∼(P ∧ Q) ⇛ ∼P V ∼Q

⇚ ⇛ LLPR: (∀x ∈ R)(x ≥ 0 V x ≤ 0) ⇚ ⇛ NIL

(∀x, y ∈ R)(xy = 0 ⇛ x = 0 V y = 0)

⇚ ⇛

slide-93
SLIDE 93

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Constructive Reverse Mathematics under B II

BISH (based on BHK) NSA (based on CL) non-constructive/non-algorithmic LLPO

For P, Q ∈ Σ1, ¬(P ∧ Q) → ¬P ∨ ¬Q

  • LLPR: (∀x ∈ R)(x ≥ 0 ∨ x ≤ 0)
  • NIL

(∀x, y ∈ R)(xy = 0 → x = 0 ∨ y = 0)

  • IVT: Intermediate value theorem

non-Ω-invariant LLPO

For P, Q ∈ Σ1, ∼(P ∧ Q) ⇛ ∼P V ∼Q

⇚ ⇛ LLPR: (∀x ∈ R)(x ≥ 0 V x ≤ 0) ⇚ ⇛ NIL

(∀x, y ∈ R)(xy = 0 ⇛ x = 0 V y = 0)

⇚ ⇛ IVT: Intermediate value theorem

slide-94
SLIDE 94

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Constructive Reverse Mathematics under B II

BISH (based on BHK) NSA (based on CL) non-constructive/non-algorithmic LLPO

For P, Q ∈ Σ1, ¬(P ∧ Q) → ¬P ∨ ¬Q

  • LLPR: (∀x ∈ R)(x ≥ 0 ∨ x ≤ 0)
  • NIL

(∀x, y ∈ R)(xy = 0 → x = 0 ∨ y = 0)

  • IVT: Intermediate value theorem

non-Ω-invariant LLPO

For P, Q ∈ Σ1, ∼(P ∧ Q) ⇛ ∼P V ∼Q

⇚ ⇛ LLPR: (∀x ∈ R)(x ≥ 0 V x ≤ 0) ⇚ ⇛ NIL

(∀x, y ∈ R)(xy = 0 ⇛ x = 0 V y = 0)

⇚ ⇛ IVT: Intermediate value theorem (int. value computed by algo)

slide-95
SLIDE 95

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Constructive Reverse Mathematics under B II

BISH (based on BHK) NSA (based on CL) non-constructive/non-algorithmic LLPO

For P, Q ∈ Σ1, ¬(P ∧ Q) → ¬P ∨ ¬Q

  • LLPR: (∀x ∈ R)(x ≥ 0 ∨ x ≤ 0)
  • NIL

(∀x, y ∈ R)(xy = 0 → x = 0 ∨ y = 0)

  • IVT: Intermediate value theorem

non-Ω-invariant LLPO

For P, Q ∈ Σ1, ∼(P ∧ Q) ⇛ ∼P V ∼Q

⇚ ⇛ LLPR: (∀x ∈ R)(x ≥ 0 V x ≤ 0) ⇚ ⇛ NIL

(∀x, y ∈ R)(xy = 0 ⇛ x = 0 V y = 0)

⇚ ⇛ IVT: Intermediate value theorem (int. value computed by algo) (int. value computed by Ω-inv. proc.)

slide-96
SLIDE 96

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Constructive Reverse Mathematics under B II

BISH (based on BHK) NSA (based on CL) non-constructive/non-algorithmic LLPO

For P, Q ∈ Σ1, ¬(P ∧ Q) → ¬P ∨ ¬Q

  • LLPR: (∀x ∈ R)(x ≥ 0 ∨ x ≤ 0)
  • NIL

(∀x, y ∈ R)(xy = 0 → x = 0 ∨ y = 0)

  • IVT: Intermediate value theorem

non-Ω-invariant LLPO

For P, Q ∈ Σ1, ∼(P ∧ Q) ⇛ ∼P V ∼Q

⇚ ⇛ LLPR: (∀x ∈ R)(x ≥ 0 V x ≤ 0) ⇚ ⇛ NIL

(∀x, y ∈ R)(xy = 0 ⇛ x = 0 V y = 0)

⇚ ⇛ IVT: Intermediate value theorem (int. value computed by algo) (int. value computed by Ω-inv. proc.)

  • WKL

⇚ ⇛ WKL

slide-97
SLIDE 97

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Constructive Reverse Mathematics under B II

BISH (based on BHK) NSA (based on CL) non-constructive/non-algorithmic LLPO

For P, Q ∈ Σ1, ¬(P ∧ Q) → ¬P ∨ ¬Q

  • LLPR: (∀x ∈ R)(x ≥ 0 ∨ x ≤ 0)
  • NIL

(∀x, y ∈ R)(xy = 0 → x = 0 ∨ y = 0)

  • IVT: Intermediate value theorem

non-Ω-invariant LLPO

For P, Q ∈ Σ1, ∼(P ∧ Q) ⇛ ∼P V ∼Q

⇚ ⇛ LLPR: (∀x ∈ R)(x ≥ 0 V x ≤ 0) ⇚ ⇛ NIL

(∀x, y ∈ R)(xy = 0 ⇛ x = 0 V y = 0)

⇚ ⇛ IVT: Intermediate value theorem (int. value computed by algo) (int. value computed by Ω-inv. proc.)

  • WKL

⇚ ⇛ WKL ⇚ ⇛ ∨-Transfer

slide-98
SLIDE 98

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Constructive Reverse Mathematics under B II

BISH (based on BHK) NSA (based on CL) non-constructive/non-algorithmic LLPO

For P, Q ∈ Σ1, ¬(P ∧ Q) → ¬P ∨ ¬Q

  • LLPR: (∀x ∈ R)(x ≥ 0 ∨ x ≤ 0)
  • NIL

(∀x, y ∈ R)(xy = 0 → x = 0 ∨ y = 0)

  • IVT: Intermediate value theorem

non-Ω-invariant LLPO

For P, Q ∈ Σ1, ∼(P ∧ Q) ⇛ ∼P V ∼Q

⇚ ⇛ LLPR: (∀x ∈ R)(x ≥ 0 V x ≤ 0) ⇚ ⇛ NIL

(∀x, y ∈ R)(xy = 0 ⇛ x = 0 V y = 0)

⇚ ⇛ IVT: Intermediate value theorem (int. value computed by algo) (int. value computed by Ω-inv. proc.)

  • WKL

⇚ ⇛ WKL ⇚ ⇛ ∨-Transfer Axioms of R: ¬(x > 0 ∧ x < 0)

slide-99
SLIDE 99

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Constructive Reverse Mathematics under B II

BISH (based on BHK) NSA (based on CL) non-constructive/non-algorithmic LLPO

For P, Q ∈ Σ1, ¬(P ∧ Q) → ¬P ∨ ¬Q

  • LLPR: (∀x ∈ R)(x ≥ 0 ∨ x ≤ 0)
  • NIL

(∀x, y ∈ R)(xy = 0 → x = 0 ∨ y = 0)

  • IVT: Intermediate value theorem

non-Ω-invariant LLPO

For P, Q ∈ Σ1, ∼(P ∧ Q) ⇛ ∼P V ∼Q

⇚ ⇛ LLPR: (∀x ∈ R)(x ≥ 0 V x ≤ 0) ⇚ ⇛ NIL

(∀x, y ∈ R)(xy = 0 ⇛ x = 0 V y = 0)

⇚ ⇛ IVT: Intermediate value theorem (int. value computed by algo) (int. value computed by Ω-inv. proc.)

  • WKL

⇚ ⇛ WKL ⇚ ⇛ ∨-Transfer Axioms of R: ¬(x > 0 ∧ x < 0) Axioms of R: ∼(x > 0 ∧ x < 0)

slide-100
SLIDE 100

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Constructive Reverse Mathematics under B III

slide-101
SLIDE 101

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Constructive Reverse Mathematics under B III

BISH (based on BHK) NSA (based on CL) non-constructive/non-algorithmic

slide-102
SLIDE 102

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Constructive Reverse Mathematics under B III

BISH (based on BHK) NSA (based on CL) non-constructive/non-algorithmic MP: For P ∈ Σ1, ¬¬P → P

slide-103
SLIDE 103

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Constructive Reverse Mathematics under B III

BISH (based on BHK) NSA (based on CL) non-constructive/non-algorithmic MP: For P ∈ Σ1, ¬¬P → P

  • MPR: (∀x ∈ R)(¬¬(x > 0) → x > 0)
slide-104
SLIDE 104

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Constructive Reverse Mathematics under B III

BISH (based on BHK) NSA (based on CL) non-constructive/non-algorithmic MP: For P ∈ Σ1, ¬¬P → P

  • MPR: (∀x ∈ R)(¬¬(x > 0) → x > 0)
  • EXT: the extensionality theorem
slide-105
SLIDE 105

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Constructive Reverse Mathematics under B III

BISH (based on BHK) NSA (based on CL) non-constructive/non-algorithmic MP: For P ∈ Σ1, ¬¬P → P

  • MPR: (∀x ∈ R)(¬¬(x > 0) → x > 0)
  • EXT: the extensionality theorem

non-Ω-invariant

slide-106
SLIDE 106

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Constructive Reverse Mathematics under B III

BISH (based on BHK) NSA (based on CL) non-constructive/non-algorithmic MP: For P ∈ Σ1, ¬¬P → P

  • MPR: (∀x ∈ R)(¬¬(x > 0) → x > 0)
  • EXT: the extensionality theorem

non-Ω-invariant MP: For P ∈ Σ1, ∼∼P ⇛ P ⇚ ⇛

slide-107
SLIDE 107

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Constructive Reverse Mathematics under B III

BISH (based on BHK) NSA (based on CL) non-constructive/non-algorithmic MP: For P ∈ Σ1, ¬¬P → P

  • MPR: (∀x ∈ R)(¬¬(x > 0) → x > 0)
  • EXT: the extensionality theorem

non-Ω-invariant MP: For P ∈ Σ1, ∼∼P ⇛ P ⇚ ⇛ MPR: (∀x ∈ R)(∼∼(x > 0) ⇛ x > 0) ⇚ ⇛

slide-108
SLIDE 108

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Constructive Reverse Mathematics under B III

BISH (based on BHK) NSA (based on CL) non-constructive/non-algorithmic MP: For P ∈ Σ1, ¬¬P → P

  • MPR: (∀x ∈ R)(¬¬(x > 0) → x > 0)
  • EXT: the extensionality theorem

non-Ω-invariant MP: For P ∈ Σ1, ∼∼P ⇛ P ⇚ ⇛ MPR: (∀x ∈ R)(∼∼(x > 0) ⇛ x > 0) ⇚ ⇛ EXT: the extensionality theorem

slide-109
SLIDE 109

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Constructive Reverse Mathematics under B III

BISH (based on BHK) NSA (based on CL) non-constructive/non-algorithmic MP: For P ∈ Σ1, ¬¬P → P

  • MPR: (∀x ∈ R)(¬¬(x > 0) → x > 0)
  • EXT: the extensionality theorem

non-Ω-invariant MP: For P ∈ Σ1, ∼∼P ⇛ P ⇚ ⇛ MPR: (∀x ∈ R)(∼∼(x > 0) ⇛ x > 0) ⇚ ⇛ EXT: the extensionality theorem WLPO: For P ∈ Σ1, ¬¬P ∨ ¬P

slide-110
SLIDE 110

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Constructive Reverse Mathematics under B III

BISH (based on BHK) NSA (based on CL) non-constructive/non-algorithmic MP: For P ∈ Σ1, ¬¬P → P

  • MPR: (∀x ∈ R)(¬¬(x > 0) → x > 0)
  • EXT: the extensionality theorem

non-Ω-invariant MP: For P ∈ Σ1, ∼∼P ⇛ P ⇚ ⇛ MPR: (∀x ∈ R)(∼∼(x > 0) ⇛ x > 0) ⇚ ⇛ EXT: the extensionality theorem WLPO: For P ∈ Σ1, ¬¬P ∨ ¬P

  • WLPR: (∀x ∈ R)
  • ¬¬(x > 0) ∨ ¬(x > 0)
slide-111
SLIDE 111

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Constructive Reverse Mathematics under B III

BISH (based on BHK) NSA (based on CL) non-constructive/non-algorithmic MP: For P ∈ Σ1, ¬¬P → P

  • MPR: (∀x ∈ R)(¬¬(x > 0) → x > 0)
  • EXT: the extensionality theorem

non-Ω-invariant MP: For P ∈ Σ1, ∼∼P ⇛ P ⇚ ⇛ MPR: (∀x ∈ R)(∼∼(x > 0) ⇛ x > 0) ⇚ ⇛ EXT: the extensionality theorem WLPO: For P ∈ Σ1, ¬¬P ∨ ¬P

  • WLPR: (∀x ∈ R)
  • ¬¬(x > 0) ∨ ¬(x > 0)
  • DISC:

A discontinuous 2N → N-function exists.

slide-112
SLIDE 112

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Constructive Reverse Mathematics under B III

BISH (based on BHK) NSA (based on CL) non-constructive/non-algorithmic MP: For P ∈ Σ1, ¬¬P → P

  • MPR: (∀x ∈ R)(¬¬(x > 0) → x > 0)
  • EXT: the extensionality theorem

non-Ω-invariant MP: For P ∈ Σ1, ∼∼P ⇛ P ⇚ ⇛ MPR: (∀x ∈ R)(∼∼(x > 0) ⇛ x > 0) ⇚ ⇛ EXT: the extensionality theorem WLPO: For P ∈ Σ1, ¬¬P ∨ ¬P

  • WLPR: (∀x ∈ R)
  • ¬¬(x > 0) ∨ ¬(x > 0)
  • DISC:

A discontinuous 2N → N-function exists. WLPO: For P ∈ Σ1, ∼∼P V ∼P ⇚ ⇛

slide-113
SLIDE 113

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Constructive Reverse Mathematics under B III

BISH (based on BHK) NSA (based on CL) non-constructive/non-algorithmic MP: For P ∈ Σ1, ¬¬P → P

  • MPR: (∀x ∈ R)(¬¬(x > 0) → x > 0)
  • EXT: the extensionality theorem

non-Ω-invariant MP: For P ∈ Σ1, ∼∼P ⇛ P ⇚ ⇛ MPR: (∀x ∈ R)(∼∼(x > 0) ⇛ x > 0) ⇚ ⇛ EXT: the extensionality theorem WLPO: For P ∈ Σ1, ¬¬P ∨ ¬P

  • WLPR: (∀x ∈ R)
  • ¬¬(x > 0) ∨ ¬(x > 0)
  • DISC:

A discontinuous 2N → N-function exists. WLPO: For P ∈ Σ1, ∼∼P V ∼P ⇚ ⇛ WLPR: (∀x ∈ R)

  • ∼∼(x > 0) V ∼(x > 0)

slide-114
SLIDE 114

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Constructive Reverse Mathematics under B III

BISH (based on BHK) NSA (based on CL) non-constructive/non-algorithmic MP: For P ∈ Σ1, ¬¬P → P

  • MPR: (∀x ∈ R)(¬¬(x > 0) → x > 0)
  • EXT: the extensionality theorem

non-Ω-invariant MP: For P ∈ Σ1, ∼∼P ⇛ P ⇚ ⇛ MPR: (∀x ∈ R)(∼∼(x > 0) ⇛ x > 0) ⇚ ⇛ EXT: the extensionality theorem WLPO: For P ∈ Σ1, ¬¬P ∨ ¬P

  • WLPR: (∀x ∈ R)
  • ¬¬(x > 0) ∨ ¬(x > 0)
  • DISC:

A discontinuous 2N → N-function exists. WLPO: For P ∈ Σ1, ∼∼P V ∼P ⇚ ⇛ WLPR: (∀x ∈ R)

  • ∼∼(x > 0) V ∼(x > 0)

⇛ DISC: A discontinuous 2N → N-function exists.

slide-115
SLIDE 115

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Constructive Reverse Mathematics under B III

BISH (based on BHK) NSA (based on CL) non-constructive/non-algorithmic MP: For P ∈ Σ1, ¬¬P → P

  • MPR: (∀x ∈ R)(¬¬(x > 0) → x > 0)
  • EXT: the extensionality theorem

non-Ω-invariant MP: For P ∈ Σ1, ∼∼P ⇛ P ⇚ ⇛ MPR: (∀x ∈ R)(∼∼(x > 0) ⇛ x > 0) ⇚ ⇛ EXT: the extensionality theorem WLPO: For P ∈ Σ1, ¬¬P ∨ ¬P

  • WLPR: (∀x ∈ R)
  • ¬¬(x > 0) ∨ ¬(x > 0)
  • DISC:

A discontinuous 2N → N-function exists. WLPO: For P ∈ Σ1, ∼∼P V ∼P ⇚ ⇛ WLPR: (∀x ∈ R)

  • ∼∼(x > 0) V ∼(x > 0)

⇛ DISC: A discontinuous 2N → N-function exists. (Four Remarks)

slide-116
SLIDE 116

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Ω-invariance is weaker than Recursive

slide-117
SLIDE 117

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Ω-invariance is weaker than Recursive

Markov’s principle MP can be reformulated as If it is impossible that a TM runs forever, then it must halt.

slide-118
SLIDE 118

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Ω-invariance is weaker than Recursive

Markov’s principle MP can be reformulated as If it is impossible that a TM runs forever, then it must halt. As no algorithmic upper bound on the halting time of the TM is given, MP is rejected in BISH.

slide-119
SLIDE 119

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Ω-invariance is weaker than Recursive

Markov’s principle MP can be reformulated as If it is impossible that a TM runs forever, then it must halt. As no algorithmic upper bound on the halting time of the TM is given, MP is rejected in BISH. The notion of algorithm in BISH is not identical to ‘recursive’.

slide-120
SLIDE 120

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Ω-invariance is weaker than Recursive

Markov’s principle MP can be reformulated as If it is impossible that a TM runs forever, then it must halt. As no algorithmic upper bound on the halting time of the TM is given, MP is rejected in BISH. The notion of algorithm in BISH is not identical to ‘recursive’.

Definition (In NSA)

A formula ψ is ∆1 if ψ ⇚ ⇛ (∃n ∈ N)ϕ1(n) ⇚ ⇛ (∀m ∈ N)ϕ2(m).

slide-121
SLIDE 121

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Ω-invariance is weaker than Recursive

Markov’s principle MP can be reformulated as If it is impossible that a TM runs forever, then it must halt. As no algorithmic upper bound on the halting time of the TM is given, MP is rejected in BISH. The notion of algorithm in BISH is not identical to ‘recursive’.

Definition (In NSA)

A formula ψ is ∆1 if ψ ⇚ ⇛ (∃n ∈ N)ϕ1(n) ⇚ ⇛ (∀m ∈ N)ϕ2(m).

Theorem (In NSA)

Only given MP, every ∆1-formula is decidable.

slide-122
SLIDE 122

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Ω-invariance is weaker than Recursive

Markov’s principle MP can be reformulated as If it is impossible that a TM runs forever, then it must halt. As no algorithmic upper bound on the halting time of the TM is given, MP is rejected in BISH. The notion of algorithm in BISH is not identical to ‘recursive’.

Definition (In NSA)

A formula ψ is ∆1 if ψ ⇚ ⇛ (∃n ∈ N)ϕ1(n) ⇚ ⇛ (∀m ∈ N)ϕ2(m).

Theorem (In NSA)

Only given MP, every ∆1-formula is decidable. But MP is not available in NSA!

slide-123
SLIDE 123

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Fannying about: FAN∆ vs WKL

FAN∆ (Every detachable bar is uniform) is accepted in INT.

slide-124
SLIDE 124

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Fannying about: FAN∆ vs WKL

FAN∆ (Every detachable bar is uniform) is accepted in INT. WKL (Every infinite tree T ⊂ 2N has a path)

slide-125
SLIDE 125

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Fannying about: FAN∆ vs WKL

FAN∆ (Every detachable bar is uniform) is accepted in INT. WKL (Every infinite tree T ⊂ 2N has a path) is the classical contraposition of FAN∆ and rejected in INT.

slide-126
SLIDE 126

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Fannying about: FAN∆ vs WKL

FAN∆ (Every detachable bar is uniform) is accepted in INT. WKL (Every infinite tree T ⊂ 2N has a path) is the classical contraposition of FAN∆ and rejected in INT. In BISH, we have WKL → FAN∆, and both are rejected.

slide-127
SLIDE 127

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Fannying about: FAN∆ vs WKL

FAN∆ (Every detachable bar is uniform) is accepted in INT. WKL (Every infinite tree T ⊂ 2N has a path) is the classical contraposition of FAN∆ and rejected in INT. In BISH, we have WKL → FAN∆, and both are rejected. What happens in NSA?

slide-128
SLIDE 128

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Fannying about: FAN∆ vs WKL

FAN∆ (Every detachable bar is uniform) is accepted in INT. WKL (Every infinite tree T ⊂ 2N has a path) is the classical contraposition of FAN∆ and rejected in INT. In BISH, we have WKL → FAN∆, and both are rejected. What happens in NSA? WKL(∀n ∈N)(∃α ∈2N)(αn ∈T) ⇛ (∃α ∈2N)(∀n ∈N)(αn ∈ T)

slide-129
SLIDE 129

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Fannying about: FAN∆ vs WKL

FAN∆ (Every detachable bar is uniform) is accepted in INT. WKL (Every infinite tree T ⊂ 2N has a path) is the classical contraposition of FAN∆ and rejected in INT. In BISH, we have WKL → FAN∆, and both are rejected. What happens in NSA? WKL(∀n ∈N)(∃α ∈2N)(αn ∈T) ⇛ (∃α ∈2N)(∀n ∈N)(αn ∈ T) ≈ If the trees T and ∗T are (hyper)infinite, they share a path.

slide-130
SLIDE 130

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Fannying about: FAN∆ vs WKL

FAN∆ (Every detachable bar is uniform) is accepted in INT. WKL (Every infinite tree T ⊂ 2N has a path) is the classical contraposition of FAN∆ and rejected in INT. In BISH, we have WKL → FAN∆, and both are rejected. What happens in NSA? WKL(∀n ∈N)(∃α ∈2N)(αn ∈T) ⇛ (∃α ∈2N)(∀n ∈N)(αn ∈ T) ≈ If the trees T and ∗T are (hyper)infinite, they share a path. FAN∆ (∀α ∈2N)(∃n ∈N)(αn ∈B)⇛(∃k ∈N)(∀α ∈2N)(∃n ≤ k)(αn∈B)

slide-131
SLIDE 131

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Fannying about: FAN∆ vs WKL

FAN∆ (Every detachable bar is uniform) is accepted in INT. WKL (Every infinite tree T ⊂ 2N has a path) is the classical contraposition of FAN∆ and rejected in INT. In BISH, we have WKL → FAN∆, and both are rejected. What happens in NSA? WKL(∀n ∈N)(∃α ∈2N)(αn ∈T) ⇛ (∃α ∈2N)(∀n ∈N)(αn ∈ T) ≈ If the trees T and ∗T are (hyper)infinite, they share a path. FAN∆ (∀α ∈2N)(∃n ∈N)(αn ∈B)⇛(∃k ∈N)(∀α ∈2N)(∃n ≤ k)(αn∈B) ≈ If a tree T is infinite, it has a path (∗T can be hyperfinite).

slide-132
SLIDE 132

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Fannying about: FAN∆ vs WKL

FAN∆ (Every detachable bar is uniform) is accepted in INT. WKL (Every infinite tree T ⊂ 2N has a path) is the classical contraposition of FAN∆ and rejected in INT. In BISH, we have WKL → FAN∆, and both are rejected. What happens in NSA? WKL(∀n ∈N)(∃α ∈2N)(αn ∈T) ⇛ (∃α ∈2N)(∀n ∈N)(αn ∈ T) ≈ If the trees T and ∗T are (hyper)infinite, they share a path. FAN∆ (∀α ∈2N)(∃n ∈N)(αn ∈B)⇛(∃k ∈N)(∀α ∈2N)(∃n ≤ k)(αn∈B) ≈ If a tree T is infinite, it has a path (∗T can be hyperfinite). In NSA, we have WKL ⇛ FAN∆.

slide-133
SLIDE 133

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

A note on Coding and Assymetry

Recall that ‘A ∈ T’ means ‘A satisfies Transfer’.

slide-134
SLIDE 134

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

A note on Coding and Assymetry

Recall that ‘A ∈ T’ means ‘A satisfies Transfer’. E.g. ‘(∀n ∈ N)ϕ(n) ∈ T’ is [(∀n ∈ N)ϕ(n) → (∀n ∈ ∗N)ϕ(n)]

slide-135
SLIDE 135

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

A note on Coding and Assymetry

Recall that ‘A ∈ T’ means ‘A satisfies Transfer’. E.g. ‘(∀n ∈ N)ϕ(n) ∈ T’ is [(∀n ∈ N)ϕ(n) → (∀n ∈ ∗N)ϕ(n)] E.g. ‘(∃n ∈ ∗N)ϕ(n) ∈ T’ is [(∃n ∈ ∗N)ϕ(n) → (∃n ∈ N1)ϕ(n)]

slide-136
SLIDE 136

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

A note on Coding and Assymetry

Recall that ‘A ∈ T’ means ‘A satisfies Transfer’. E.g. ‘(∀n ∈ N)ϕ(n) ∈ T’ is [(∀n ∈ N)ϕ(n) → (∀n ∈ ∗N)ϕ(n)] E.g. ‘(∃n ∈ ∗N)ϕ(n) ∈ T’ is [(∃n ∈ ∗N)ϕ(n) → (∃n ∈ N1)ϕ(n)] Transfer is clearly asymmetric.

slide-137
SLIDE 137

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

A note on Coding and Assymetry

Recall that ‘A ∈ T’ means ‘A satisfies Transfer’. E.g. ‘(∀n ∈ N)ϕ(n) ∈ T’ is [(∀n ∈ N)ϕ(n) → (∀n ∈ ∗N)ϕ(n)] E.g. ‘(∃n ∈ ∗N)ϕ(n) ∈ T’ is [(∃n ∈ ∗N)ϕ(n) → (∃n ∈ N1)ϕ(n)] Transfer is clearly asymmetric. First, to make hypernegation ‘∼’ work like intuitionistic negation.

slide-138
SLIDE 138

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

A note on Coding and Assymetry

Recall that ‘A ∈ T’ means ‘A satisfies Transfer’. E.g. ‘(∀n ∈ N)ϕ(n) ∈ T’ is [(∀n ∈ N)ϕ(n) → (∀n ∈ ∗N)ϕ(n)] E.g. ‘(∃n ∈ ∗N)ϕ(n) ∈ T’ is [(∃n ∈ ∗N)ϕ(n) → (∃n ∈ N1)ϕ(n)] Transfer is clearly asymmetric. First, to make hypernegation ‘∼’ work like intuitionistic negation. Secondly, for fundamental reasons:

slide-139
SLIDE 139

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

A note on Coding and Assymetry

Recall that ‘A ∈ T’ means ‘A satisfies Transfer’. E.g. ‘(∀n ∈ N)ϕ(n) ∈ T’ is [(∀n ∈ N)ϕ(n) → (∀n ∈ ∗N)ϕ(n)] E.g. ‘(∃n ∈ ∗N)ϕ(n) ∈ T’ is [(∃n ∈ ∗N)ϕ(n) → (∃n ∈ N1)ϕ(n)] Transfer is clearly asymmetric. First, to make hypernegation ‘∼’ work like intuitionistic negation. Secondly, for fundamental reasons:

In ‘(∃n0 ∈ ∗N)ϕ(n0)’, the number n0 could be a code for some f : N → N (Keisler).

slide-140
SLIDE 140

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

A note on Coding and Assymetry

Recall that ‘A ∈ T’ means ‘A satisfies Transfer’. E.g. ‘(∀n ∈ N)ϕ(n) ∈ T’ is [(∀n ∈ N)ϕ(n) → (∀n ∈ ∗N)ϕ(n)] E.g. ‘(∃n ∈ ∗N)ϕ(n) ∈ T’ is [(∃n ∈ ∗N)ϕ(n) → (∃n ∈ N1)ϕ(n)] Transfer is clearly asymmetric. First, to make hypernegation ‘∼’ work like intuitionistic negation. Secondly, for fundamental reasons:

In ‘(∃n0 ∈ ∗N)ϕ(n0)’, the number n0 could be a code for some f : N → N (Keisler). If ‘(∃n0 ∈ ∗N)ϕ(n0)’ implies ‘(∃n1 ∈ N)ϕ(n1)’, then f has a finite code n1 ∈ N, making its graph ∆0.

slide-141
SLIDE 141

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Constructive Reverse Mathematics under B IV

slide-142
SLIDE 142

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Constructive Reverse Mathematics under B IV

Same for WMP, FAN∆, BD-N, and MP∨.

slide-143
SLIDE 143

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Constructive Reverse Mathematics under B IV

Same for WMP, FAN∆, BD-N, and MP∨. Same for ‘mixed’ theorems:

slide-144
SLIDE 144

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Constructive Reverse Mathematics under B IV

Same for WMP, FAN∆, BD-N, and MP∨. Same for ‘mixed’ theorems: BISH (based on BHK) NSA (based on CL)

slide-145
SLIDE 145

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Constructive Reverse Mathematics under B IV

Same for WMP, FAN∆, BD-N, and MP∨. Same for ‘mixed’ theorems: BISH (based on BHK) NSA (based on CL) LPO ↔ MP+WLPO

slide-146
SLIDE 146

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Constructive Reverse Mathematics under B IV

Same for WMP, FAN∆, BD-N, and MP∨. Same for ‘mixed’ theorems: BISH (based on BHK) NSA (based on CL) LPO ↔ MP+WLPO MP ↔ WMP + MP∨

slide-147
SLIDE 147

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Constructive Reverse Mathematics under B IV

Same for WMP, FAN∆, BD-N, and MP∨. Same for ‘mixed’ theorems: BISH (based on BHK) NSA (based on CL) LPO ↔ MP+WLPO MP ↔ WMP + MP∨ WLPO → LLPO

slide-148
SLIDE 148

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Constructive Reverse Mathematics under B IV

Same for WMP, FAN∆, BD-N, and MP∨. Same for ‘mixed’ theorems: BISH (based on BHK) NSA (based on CL) LPO ↔ MP+WLPO MP ↔ WMP + MP∨ WLPO → LLPO LLPO → MP∨

slide-149
SLIDE 149

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Constructive Reverse Mathematics under B IV

Same for WMP, FAN∆, BD-N, and MP∨. Same for ‘mixed’ theorems: BISH (based on BHK) NSA (based on CL) LPO ↔ MP+WLPO MP ↔ WMP + MP∨ WLPO → LLPO LLPO → MP∨ LPO → BD-N

slide-150
SLIDE 150

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Constructive Reverse Mathematics under B IV

Same for WMP, FAN∆, BD-N, and MP∨. Same for ‘mixed’ theorems: BISH (based on BHK) NSA (based on CL) LPO ↔ MP+WLPO MP ↔ WMP + MP∨ WLPO → LLPO LLPO → MP∨ LPO → BD-N LLPO → FAN∆

slide-151
SLIDE 151

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Constructive Reverse Mathematics under B IV

Same for WMP, FAN∆, BD-N, and MP∨. Same for ‘mixed’ theorems: BISH (based on BHK) NSA (based on CL) LPO ↔ MP+WLPO MP ↔ WMP + MP∨ WLPO → LLPO LLPO → MP∨ LPO → BD-N LLPO → FAN∆ LLPO ↔ WKL

slide-152
SLIDE 152

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Constructive Reverse Mathematics under B IV

Same for WMP, FAN∆, BD-N, and MP∨. Same for ‘mixed’ theorems: BISH (based on BHK) NSA (based on CL) LPO ↔ MP+WLPO MP ↔ WMP + MP∨ WLPO → LLPO LLPO → MP∨ LPO → BD-N LLPO → FAN∆ LLPO ↔ WKL LPO ⇚ ⇛ MP + WLPO MP ⇚ ⇛ WMP + MP∨ WLPO ⇛ LLPO LLPO ⇛ MP∨ LPO ⇛ BD-N LLPO ⇛ FAN∆ LLPO ⇚ ⇛ WKL

slide-153
SLIDE 153

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Conclusion: NSA ≈ BISH

slide-154
SLIDE 154

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Conclusion: NSA ≈ BISH

If BISH ⊢ X then X→LPO, LLPO, MP, . . . (princ. rejected in BISH)

If NSA ⊢ Y then Y ⇛ LPO, LLPO, MP, . . . (not provable in NSA)

slide-155
SLIDE 155

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Conclusion: NSA ≈ BISH

If BISH ⊢ X then X→LPO, LLPO, MP, . . . (princ. rejected in BISH)

If NSA ⊢ Y then Y ⇛ LPO, LLPO, MP, . . . (not provable in NSA)

Reuniting the antipodes (Palmgren & Moerdijk).

slide-156
SLIDE 156

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Conclusion: NSA ≈ BISH

If BISH ⊢ X then X→LPO, LLPO, MP, . . . (princ. rejected in BISH)

If NSA ⊢ Y then Y ⇛ LPO, LLPO, MP, . . . (not provable in NSA)

Reuniting the antipodes (Palmgren & Moerdijk). Reverse-engineering Reverse Mathematics (Fuchino-sensei)

slide-157
SLIDE 157

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Future work: Type Theory

Martin-L¨

  • f intended his type theory as a foundation for BISH.
slide-158
SLIDE 158

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Future work: Type Theory

Martin-L¨

  • f intended his type theory as a foundation for BISH.

Can Ω-invariance help capture e.g. Type Theory?

slide-159
SLIDE 159

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Future work: Type Theory

Martin-L¨

  • f intended his type theory as a foundation for BISH.

Can Ω-invariance help capture e.g. Type Theory? Homotopy: f (x) g(x)

slide-160
SLIDE 160

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Future work: Type Theory

Martin-L¨

  • f intended his type theory as a foundation for BISH.

Can Ω-invariance help capture e.g. Type Theory? Homotopy: f (x) g(x)

  • continuous transformation ht of f to g (t ∈ [0, 1]).
slide-161
SLIDE 161

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Future work: Type Theory

Martin-L¨

  • f intended his type theory as a foundation for BISH.

Can Ω-invariance help capture e.g. Type Theory? Homotopy: f (x) g(x)

  • continuous transformation ht of f to g (t ∈ [0, 1]).

ht1(x) ht2(x) ht3(x) . . . . . . . . .

  • h1(x) =

h0(x) =

slide-162
SLIDE 162

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Future work: Type Theory

Martin-L¨

  • f intended his type theory as a foundation for BISH.

Can Ω-invariance help capture e.g. Type Theory? Homotopy: f (x) g(x)

  • ✑✑

  • ✏✏✏✏

  • PPPP

P ❅ ❅ ❅ ❅ ❅

mω(x) ≈ kω(x) ≈

  • ◗◗

  • PPPP

P

  • PPPP

P✚✚✚✚✚

slide-163
SLIDE 163

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Future work: Type Theory

Martin-L¨

  • f intended his type theory as a foundation for BISH.

Can Ω-invariance help capture e.g. Type Theory? Homotopy: f (x) g(x)

  • ✑✑

  • ✏✏✏✏

  • PPPP

P ❅ ❅ ❅ ❅ ❅

mω(x) ≈ kω(x) ≈

  • ◗◗

  • PPPP

P

  • PPPP

P✚✚✚✚✚

  • PPPP

P

  • ✏✏✏✏

increment is multiple of 1

ω

slide-164
SLIDE 164

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Future work: Type Theory

Martin-L¨

  • f intended his type theory as a foundation for BISH.

Can Ω-invariance help capture e.g. Type Theory? Homotopy: f (x) g(x)

  • ✑✑

  • ✏✏✏✏

  • PPPP

P ❅ ❅ ❅ ❅ ❅

mω(x) ≈ kω(x) ≈

  • ◗◗

  • PPPP

P

  • PPPP

P✚✚✚✚✚

  • PPPP

P

  • ✏✏✏✏

increment is multiple of 1

ω

ONE basic step

slide-165
SLIDE 165

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Future work: Type Theory

Martin-L¨

  • f intended his type theory as a foundation for BISH.

Can Ω-invariance help capture e.g. Type Theory? Homotopy: f (x) g(x)

  • ✑✑

  • ✏✏✏✏

  • PPPP

P ❅ ❅ ❅ ❅ ❅

mω(x) ≈ kω(x) ≈

  • ◗◗

  • PPPP

P

  • PPPP

P✚✚✚✚✚

  • PPPP

P

  • ✏✏✏✏

ONE basic step . . . ω basic steps . . .

slide-166
SLIDE 166

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Future work: Type Theory

Martin-L¨

  • f intended his type theory as a foundation for BISH.

Can Ω-invariance help capture e.g. Type Theory? Homotopy: f (x) g(x)

  • ✑✑

  • ✏✏✏✏

  • PPPP

P ❅ ❅ ❅ ❅ ❅

mω(x) ≈ kω(x) ≈

  • ◗◗

  • PPPP

P

  • PPPP

P✚✚✚✚✚

  • PPPP

P

  • ✏✏✏✏

ONE basic step . . . ω basic steps . . . Independent of the choice of ω

slide-167
SLIDE 167

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Future work: Type Theory

Martin-L¨

  • f intended his type theory as a foundation for BISH.

Can Ω-invariance help capture e.g. Type Theory? Homotopy: f (x) g(x)

  • ✑✑

  • ✏✏✏✏

  • PPPP

P ❅ ❅ ❅ ❅ ❅

mω(x) ≈ kω(x) ≈

  • ◗◗

  • PPPP

P

  • PPPP

P✚✚✚✚✚

  • PPPP

P

  • ✏✏✏✏

ONE basic step . . . ω basic steps . . . Independent of the choice of ω ≈ Ω-invariant broken-line transformation hω,t of f to g.

slide-168
SLIDE 168

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Philosophy of Physics

slide-169
SLIDE 169

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Philosophy of Physics

Why is Mathematics in Physics so constructive/computable?

slide-170
SLIDE 170

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Philosophy of Physics

Why is Mathematics in Physics so constructive/computable? Indeed, most of Physics can be formalized in BISH (e.g. Gleason’s theorem).

slide-171
SLIDE 171

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Philosophy of Physics

Why is Mathematics in Physics so constructive/computable? Indeed, most of Physics can be formalized in BISH (e.g. Gleason’s theorem). Yet, in Physics, an informal version of NSA is used to date.

slide-172
SLIDE 172

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Philosophy of Physics

Why is Mathematics in Physics so constructive/computable? Indeed, most of Physics can be formalized in BISH (e.g. Gleason’s theorem). Yet, in Physics, an informal version of NSA is used to date. (Weierstraß’ notorious ‘ε-δ’ method was never adopted, neither was BISH).

slide-173
SLIDE 173

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Philosophy of Physics

Why is Mathematics in Physics so constructive/computable? Indeed, most of Physics can be formalized in BISH (e.g. Gleason’s theorem). Yet, in Physics, an informal version of NSA is used to date. (Weierstraß’ notorious ‘ε-δ’ method was never adopted, neither was BISH). Now, in Physics, the end result of a calculation should have physical meaning (modeling of reality).

slide-174
SLIDE 174

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Philosophy of Physics

Why is Mathematics in Physics so constructive/computable? Indeed, most of Physics can be formalized in BISH (e.g. Gleason’s theorem). Yet, in Physics, an informal version of NSA is used to date. (Weierstraß’ notorious ‘ε-δ’ method was never adopted, neither was BISH). Now, in Physics, the end result of a calculation should have physical meaning (modeling of reality). A mathematical result with physical meaning will not depend on the choice of infinite number/infinitesimal used, i.e. it is Ω-invariant. (Alain Connes)

slide-175
SLIDE 175

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Philosophy of Mathematics: Whither Structuralism?

slide-176
SLIDE 176

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Philosophy of Mathematics: Whither Structuralism?

Structuralism ≈ Mathematics is about a single structure.

slide-177
SLIDE 177

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Philosophy of Mathematics: Whither Structuralism?

Structuralism ≈ Mathematics is about a single structure. E.g. first-order arithmetic is about (models isomorphic to) the standard model N.

slide-178
SLIDE 178

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Philosophy of Mathematics: Whither Structuralism?

Structuralism ≈ Mathematics is about a single structure. E.g. first-order arithmetic is about (models isomorphic to) the standard model N. Problem: How to exclude the nonstandard models of arithmetic? (Second-order?, Tennenbaum’s Theorem?)

slide-179
SLIDE 179

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Philosophy of Mathematics: Whither Structuralism?

Structuralism ≈ Mathematics is about a single structure. E.g. first-order arithmetic is about (models isomorphic to) the standard model N. Problem: How to exclude the nonstandard models of arithmetic? (Second-order?, Tennenbaum’s Theorem?) When life gives you lemons... you make Ω-invariance:

slide-180
SLIDE 180

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Philosophy of Mathematics: Whither Structuralism?

Structuralism ≈ Mathematics is about a single structure. E.g. first-order arithmetic is about (models isomorphic to) the standard model N. Problem: How to exclude the nonstandard models of arithmetic? (Second-order?, Tennenbaum’s Theorem?) When life gives you lemons... you make Ω-invariance: Arithmetic is about a computationally robust variety of structures.

slide-181
SLIDE 181

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Philosophy of Mathematics: Whither Structuralism?

Structuralism ≈ Mathematics is about a single structure. E.g. first-order arithmetic is about (models isomorphic to) the standard model N. Problem: How to exclude the nonstandard models of arithmetic? (Second-order?, Tennenbaum’s Theorem?) When life gives you lemons... you make Ω-invariance: Arithmetic is about a computationally robust variety of structures. Despite Tennenbaum’s Theorem, one can define computability/constructivity via Ω-invariance in each nonstandard model of arithmetic.

slide-182
SLIDE 182

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Final Thoughts

slide-183
SLIDE 183

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Final Thoughts

And what are these [infinitesimals]? [. . . ] They are neither finite Quantities nor Quantities infinitely small, nor yet nothing. May we not call them the ghosts of departed quantities?

George Berkeley, The Analyst

slide-184
SLIDE 184

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Final Thoughts

And what are these [infinitesimals]? [. . . ] They are neither finite Quantities nor Quantities infinitely small, nor yet nothing. May we not call them the ghosts of departed quantities?

George Berkeley, The Analyst ...there are good reasons to believe that Nonstandard Analysis, in some version or other, will be the analysis of the future. Kurt G¨

  • del
slide-185
SLIDE 185

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Final Thoughts

And what are these [infinitesimals]? [. . . ] They are neither finite Quantities nor Quantities infinitely small, nor yet nothing. May we not call them the ghosts of departed quantities?

George Berkeley, The Analyst ...there are good reasons to believe that Nonstandard Analysis, in some version or other, will be the analysis of the future. Kurt G¨

  • del

We thank the John Templeton Foundation for its generous support!

slide-186
SLIDE 186

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Final Thoughts

And what are these [infinitesimals]? [. . . ] They are neither finite Quantities nor Quantities infinitely small, nor yet nothing. May we not call them the ghosts of departed quantities?

George Berkeley, The Analyst ...there are good reasons to believe that Nonstandard Analysis, in some version or other, will be the analysis of the future. Kurt G¨

  • del

We thank the John Templeton Foundation for its generous support!

Thank you for your attention!

slide-187
SLIDE 187

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Final Thoughts

And what are these [infinitesimals]? [. . . ] They are neither finite Quantities nor Quantities infinitely small, nor yet nothing. May we not call them the ghosts of departed quantities?

George Berkeley, The Analyst ...there are good reasons to believe that Nonstandard Analysis, in some version or other, will be the analysis of the future. Kurt G¨

  • del

We thank the John Templeton Foundation for its generous support!

Thank you for your attention!

Any questions?

slide-188
SLIDE 188

Introduction NSA, BISH and Constructive Reverse Mathematics Conclusion

Take-home message

In Nonstandard Analysis, an algorithm is any object whose definition is independent of the choice of infinitesimal (Ω-invariance).

More technically, we define a translation between Constructive Analysis (BISH) and Nonstandard Analysis (NSA):

(Proof and Algorithm) in BISH = (Transfer and Ω-invariance) in NSA Most results from CRM (= RM based on BISH) translate to NSA via a natural translation B.