the unreasonable effectiveness of nonstandard analysis
play

The unreasonable effectiveness of Nonstandard Analysis Sam Sanders - PowerPoint PPT Presentation

The unreasonable effectiveness of Nonstandard Analysis Sam Sanders CCC, Kochel, Sept. 2015 Introduction: NSA 101 Mining NSA Additional results Aim and motivation Aim: To show that proofs of theorems of PURE Nonstandard Analysis can be mined


  1. Introduction: NSA 101 Mining NSA Additional results Introducing Nonstandard Analysis Nelson’s Internal Set Theory is a syntactic approach to Nonstandard Analysis. Add a new predicate st( x ) read ‘ x is standard’ to L ZFC . We write ( ∃ st x ) and ( ∀ st y ) for ( ∃ x )(st( x ) ∧ . . . ) and ( ∀ y )(st( y ) → . . . ).

  2. Introduction: NSA 101 Mining NSA Additional results Introducing Nonstandard Analysis Nelson’s Internal Set Theory is a syntactic approach to Nonstandard Analysis. Add a new predicate st( x ) read ‘ x is standard’ to L ZFC . We write ( ∃ st x ) and ( ∀ st y ) for ( ∃ x )(st( x ) ∧ . . . ) and ( ∀ y )(st( y ) → . . . ). A formula is internal if it does not contain ‘st’; external otherwise

  3. Introduction: NSA 101 Mining NSA Additional results Introducing Nonstandard Analysis Nelson’s Internal Set Theory is a syntactic approach to Nonstandard Analysis. Add a new predicate st( x ) read ‘ x is standard’ to L ZFC . We write ( ∃ st x ) and ( ∀ st y ) for ( ∃ x )(st( x ) ∧ . . . ) and ( ∀ y )(st( y ) → . . . ). A formula is internal if it does not contain ‘st’; external otherwise Internal Set Theory IST is ZFC plus the new axioms:

  4. Introduction: NSA 101 Mining NSA Additional results Introducing Nonstandard Analysis Nelson’s Internal Set Theory is a syntactic approach to Nonstandard Analysis. Add a new predicate st( x ) read ‘ x is standard’ to L ZFC . We write ( ∃ st x ) and ( ∀ st y ) for ( ∃ x )(st( x ) ∧ . . . ) and ( ∀ y )(st( y ) → . . . ). A formula is internal if it does not contain ‘st’; external otherwise Internal Set Theory IST is ZFC plus the new axioms: Transfer: ( ∀ st x ) ϕ ( x , t ) → ( ∀ x ) ϕ ( x , t ) for internal ϕ and standard t .

  5. Introduction: NSA 101 Mining NSA Additional results Introducing Nonstandard Analysis Nelson’s Internal Set Theory is a syntactic approach to Nonstandard Analysis. Add a new predicate st( x ) read ‘ x is standard’ to L ZFC . We write ( ∃ st x ) and ( ∀ st y ) for ( ∃ x )(st( x ) ∧ . . . ) and ( ∀ y )(st( y ) → . . . ). A formula is internal if it does not contain ‘st’; external otherwise Internal Set Theory IST is ZFC plus the new axioms: Transfer: ( ∀ st x ) ϕ ( x , t ) → ( ∀ x ) ϕ ( x , t ) for internal ϕ and standard t . Standard Part: ( ∀ x )( ∃ st y )( ∀ st z )( z ∈ x ↔ z ∈ y ).

  6. Introduction: NSA 101 Mining NSA Additional results Introducing Nonstandard Analysis Nelson’s Internal Set Theory is a syntactic approach to Nonstandard Analysis. Add a new predicate st( x ) read ‘ x is standard’ to L ZFC . We write ( ∃ st x ) and ( ∀ st y ) for ( ∃ x )(st( x ) ∧ . . . ) and ( ∀ y )(st( y ) → . . . ). A formula is internal if it does not contain ‘st’; external otherwise Internal Set Theory IST is ZFC plus the new axioms: Transfer: ( ∀ st x ) ϕ ( x , t ) → ( ∀ x ) ϕ ( x , t ) for internal ϕ and standard t . Standard Part: ( ∀ x )( ∃ st y )( ∀ st z )( z ∈ x ↔ z ∈ y ). Idealization:. . . (push quantifiers ( ∀ st x ) and ( ∃ st y ) to the front)

  7. Introduction: NSA 101 Mining NSA Additional results Introducing Nonstandard Analysis Nelson’s Internal Set Theory is a syntactic approach to Nonstandard Analysis. Add a new predicate st( x ) read ‘ x is standard’ to L ZFC . We write ( ∃ st x ) and ( ∀ st y ) for ( ∃ x )(st( x ) ∧ . . . ) and ( ∀ y )(st( y ) → . . . ). A formula is internal if it does not contain ‘st’; external otherwise Internal Set Theory IST is ZFC plus the new axioms: Transfer: ( ∀ st x ) ϕ ( x , t ) → ( ∀ x ) ϕ ( x , t ) for internal ϕ and standard t . Standard Part: ( ∀ x )( ∃ st y )( ∀ st z )( z ∈ x ↔ z ∈ y ). Idealization:. . . (push quantifiers ( ∀ st x ) and ( ∃ st y ) to the front) Conservation: ZFC and IST prove the same internal sentences.

  8. Introduction: NSA 101 Mining NSA Additional results Introducing Nonstandard Analysis Nelson’s Internal Set Theory is a syntactic approach to Nonstandard Analysis. Add a new predicate st( x ) read ‘ x is standard’ to L ZFC . We write ( ∃ st x ) and ( ∀ st y ) for ( ∃ x )(st( x ) ∧ . . . ) and ( ∀ y )(st( y ) → . . . ). A formula is internal if it does not contain ‘st’; external otherwise Internal Set Theory IST is ZFC plus the new axioms: Transfer: ( ∀ st x ) ϕ ( x , t ) → ( ∀ x ) ϕ ( x , t ) for internal ϕ and standard t . Standard Part: ( ∀ x )( ∃ st y )( ∀ st z )( z ∈ x ↔ z ∈ y ). Idealization:. . . (push quantifiers ( ∀ st x ) and ( ∃ st y ) to the front) Conservation: ZFC and IST prove the same internal sentences. And analogous results for fragments of IST.

  9. Introduction: NSA 101 Mining NSA Additional results A fragment based on G¨ odel’s T van den Berg, Briseid, Safarik, A functional interpretation of nonstandard arithmetic, APAL2012

  10. Introduction: NSA 101 Mining NSA Additional results A fragment based on G¨ odel’s T van den Berg, Briseid, Safarik, A functional interpretation of nonstandard arithmetic, APAL2012 E-PA ω is Peano arithmetic in all finite types with the axiom of extensionality.

  11. Introduction: NSA 101 Mining NSA Additional results A fragment based on G¨ odel’s T van den Berg, Briseid, Safarik, A functional interpretation of nonstandard arithmetic, APAL2012 E-PA ω is Peano arithmetic in all finite types with the axiom of extensionality. I is Nelson’s idealisation axiom in the language of finite types.

  12. Introduction: NSA 101 Mining NSA Additional results A fragment based on G¨ odel’s T van den Berg, Briseid, Safarik, A functional interpretation of nonstandard arithmetic, APAL2012 E-PA ω is Peano arithmetic in all finite types with the axiom of extensionality. I is Nelson’s idealisation axiom in the language of finite types. HAC int is a weak version of Nelson’s Standard Part axiom:

  13. Introduction: NSA 101 Mining NSA Additional results A fragment based on G¨ odel’s T van den Berg, Briseid, Safarik, A functional interpretation of nonstandard arithmetic, APAL2012 E-PA ω is Peano arithmetic in all finite types with the axiom of extensionality. I is Nelson’s idealisation axiom in the language of finite types. HAC int is a weak version of Nelson’s Standard Part axiom: ( ∀ st x ρ )( ∃ st y τ ) ϕ ( x , y ) → ( ∃ st f ρ → τ ∗ )( ∀ st x ρ )( ∃ y τ ∈ f ( x )) ϕ ( x , y ) Only a finite sequence of witnesses; ϕ is internal.

  14. Introduction: NSA 101 Mining NSA Additional results A fragment based on G¨ odel’s T van den Berg, Briseid, Safarik, A functional interpretation of nonstandard arithmetic, APAL2012 E-PA ω is Peano arithmetic in all finite types with the axiom of extensionality. I is Nelson’s idealisation axiom in the language of finite types. HAC int is a weak version of Nelson’s Standard Part axiom: ( ∀ st x ρ )( ∃ st y τ ) ϕ ( x , y ) → ( ∃ st f ρ → τ ∗ )( ∀ st x ρ )( ∃ y τ ∈ f ( x )) ϕ ( x , y ) Only a finite sequence of witnesses; ϕ is internal. P := E-PA ω + I + HAC int is a conservative extension of E-PA ω .

  15. Introduction: NSA 101 Mining NSA Additional results A fragment based on G¨ odel’s T van den Berg, Briseid, Safarik, A functional interpretation of nonstandard arithmetic, APAL2012 E-PA ω is Peano arithmetic in all finite types with the axiom of extensionality. I is Nelson’s idealisation axiom in the language of finite types. HAC int is a weak version of Nelson’s Standard Part axiom: ( ∀ st x ρ )( ∃ st y τ ) ϕ ( x , y ) → ( ∃ st f ρ → τ ∗ )( ∀ st x ρ )( ∃ y τ ∈ f ( x )) ϕ ( x , y ) Only a finite sequence of witnesses; ϕ is internal. P := E-PA ω + I + HAC int is a conservative extension of E-PA ω . Same for nonstandard version H of E-HA ω and intuitionistic logic.

  16. Introduction: NSA 101 Mining NSA Additional results A new computational aspect of NSA

  17. Introduction: NSA 101 Mining NSA Additional results A new computational aspect of NSA TERM EXTRACTION

  18. Introduction: NSA 101 Mining NSA Additional results A new computational aspect of NSA TERM EXTRACTION van den Berg, Briseid, Safarik, A functional interpretation of nonstandard arithmetic, APAL2012

  19. Introduction: NSA 101 Mining NSA Additional results A new computational aspect of NSA TERM EXTRACTION van den Berg, Briseid, Safarik, A functional interpretation of nonstandard arithmetic, APAL2012 If system P (resp. H) proves ( ∀ st x )( ∃ st y ) ϕ ( x , y ) ( ϕ internal)

  20. Introduction: NSA 101 Mining NSA Additional results A new computational aspect of NSA TERM EXTRACTION van den Berg, Briseid, Safarik, A functional interpretation of nonstandard arithmetic, APAL2012 If system P (resp. H) proves ( ∀ st x )( ∃ st y ) ϕ ( x , y ) ( ϕ internal) then a term t can be extracted from this proof such that E-PA ω (resp. E-HA ω ) proves ( ∀ x )( ∃ y ∈ t ( x )) ϕ ( x , y ).

  21. Introduction: NSA 101 Mining NSA Additional results A new computational aspect of NSA TERM EXTRACTION van den Berg, Briseid, Safarik, A functional interpretation of nonstandard arithmetic, APAL2012 If system P (resp. H) proves ( ∀ st x )( ∃ st y ) ϕ ( x , y ) ( ϕ internal) then a term t can be extracted from this proof such that E-PA ω (resp. E-HA ω ) proves ( ∀ x )( ∃ y ∈ t ( x )) ϕ ( x , y ). OBSERVATION: Nonstandard definitions (of continuity, compactness, Riemann int., etc) can be brought into the ‘normal form’ ( ∀ st x )( ∃ st y ) ϕ ( x , y ).

  22. Introduction: NSA 101 Mining NSA Additional results A new computational aspect of NSA TERM EXTRACTION van den Berg, Briseid, Safarik, A functional interpretation of nonstandard arithmetic, APAL2012 If system P (resp. H) proves ( ∀ st x )( ∃ st y ) ϕ ( x , y ) ( ϕ internal) then a term t can be extracted from this proof such that E-PA ω (resp. E-HA ω ) proves ( ∀ x )( ∃ y ∈ t ( x )) ϕ ( x , y ). OBSERVATION: Nonstandard definitions (of continuity, compactness, Riemann int., etc) can be brought into the ‘normal form’ ( ∀ st x )( ∃ st y ) ϕ ( x , y ). Such normal forms are closed under modes ponens (in both P and H)

  23. Introduction: NSA 101 Mining NSA Additional results A new computational aspect of NSA TERM EXTRACTION van den Berg, Briseid, Safarik, A functional interpretation of nonstandard arithmetic, APAL2012 If system P (resp. H) proves ( ∀ st x )( ∃ st y ) ϕ ( x , y ) ( ϕ internal) then a term t can be extracted from this proof such that E-PA ω (resp. E-HA ω ) proves ( ∀ x )( ∃ y ∈ t ( x )) ϕ ( x , y ). OBSERVATION: Nonstandard definitions (of continuity, compactness, Riemann int., etc) can be brought into the ‘normal form’ ( ∀ st x )( ∃ st y ) ϕ ( x , y ). Such normal forms are closed under modes ponens (in both P and H) All theorems of PURE Nonstandard Analysis can be mined using the term extraction result (of P and H).

  24. Introduction: NSA 101 Mining NSA Additional results The unreasonable effectiveness of NSA Example I: Continuity.

  25. Introduction: NSA 101 Mining NSA Additional results The unreasonable effectiveness of NSA Example I: Continuity. From a proof that f is nonstandard uniformly continuous in P, i.e. ( ∀ x , y ∈ [0 , 1])( x ≈ y → f ( x ) ≈ f ( y )) ,

  26. Introduction: NSA 101 Mining NSA Additional results The unreasonable effectiveness of NSA Example I: Continuity. From a proof that f is nonstandard uniformly continuous in P, i.e. ( ∀ x , y ∈ [0 , 1])( x ≈ y → f ( x ) ≈ f ( y )) , (1) we can extract a term t 1 (from G¨ odel’s T) such that E-PA ω proves ( ∀ k 0 )( ∀ x , y ∈ [0 , 1])( | x − y | < t ( k ) → | f ( x ) − f ( y ) | < 1 1 k ) , (2)

  27. Introduction: NSA 101 Mining NSA Additional results The unreasonable effectiveness of NSA Example I: Continuity. From a proof that f is nonstandard uniformly continuous in P, i.e. ( ∀ x , y ∈ [0 , 1])( x ≈ y → f ( x ) ≈ f ( y )) , (1) we can extract a term t 1 (from G¨ odel’s T) such that E-PA ω proves ( ∀ k 0 )( ∀ x , y ∈ [0 , 1])( | x − y | < t ( k ) → | f ( x ) − f ( y ) | < 1 1 k ) , (2) AND VICE VERSA: E-PA ω ⊢ (2) implies P ⊢ (1).

  28. Introduction: NSA 101 Mining NSA Additional results The unreasonable effectiveness of NSA Example I: Continuity. From a proof that f is nonstandard uniformly continuous in P, i.e. ( ∀ x , y ∈ [0 , 1])( x ≈ y → f ( x ) ≈ f ( y )) , (1) we can extract a term t 1 (from G¨ odel’s T) such that E-PA ω proves ( ∀ k 0 )( ∀ x , y ∈ [0 , 1])( | x − y | < t ( k ) → | f ( x ) − f ( y ) | < 1 1 k ) , (2) AND VICE VERSA: E-PA ω ⊢ (2) implies P ⊢ (1). (2) is the notion of continuity (with a modulus t ) used in constructive analysis and computable math (Bishop, etc).

  29. Introduction: NSA 101 Mining NSA Additional results The unreasonable effectiveness of NSA Example I: Continuity. From a proof that f is nonstandard uniformly continuous in P, i.e. ( ∀ x , y ∈ [0 , 1])( x ≈ y → f ( x ) ≈ f ( y )) , (1) we can extract a term t 1 (from G¨ odel’s T) such that E-PA ω proves ( ∀ k 0 )( ∀ x , y ∈ [0 , 1])( | x − y | < t ( k ) → | f ( x ) − f ( y ) | < 1 1 k ) , (2) AND VICE VERSA: E-PA ω ⊢ (2) implies P ⊢ (1). (2) is the notion of continuity (with a modulus t ) used in constructive analysis and computable math (Bishop, etc). Et pour les constructivists: la mˆ e me chose!

  30. Introduction: NSA 101 Mining NSA Additional results The unreasonable effectiveness of NSA Example II: Continuity implies Riemann integration

  31. Introduction: NSA 101 Mining NSA Additional results The unreasonable effectiveness of NSA Example II: Continuity implies Riemann integration From a proof that nonstandard uniformly continuity implies nonstandard Riemann integration in P, i.e.

  32. Introduction: NSA 101 Mining NSA Additional results The unreasonable effectiveness of NSA Example II: Continuity implies Riemann integration From a proof that nonstandard uniformly continuity implies nonstandard Riemann integration in P, i.e. � ( ∀ f : R → R ) ( ∀ x , y ∈ [0 , 1])[ x ≈ y → f ( x ) ≈ f ( y )] ↓ ( ∀ π, π ′ ∈ P ([0 , 1]))( � π � , � π ′ � ≈ 0 → S π ( f ) ≈ S π ′ ( f )) � ,

  33. Introduction: NSA 101 Mining NSA Additional results The unreasonable effectiveness of NSA Example II: Continuity implies Riemann integration From a proof that nonstandard uniformly continuity implies nonstandard Riemann integration in P, i.e. � ( ∀ f : R → R ) ( ∀ x , y ∈ [0 , 1])[ x ≈ y → f ( x ) ≈ f ( y )] ↓ ( ∀ π, π ′ ∈ P ([0 , 1]))( � π � , � π ′ � ≈ 0 → S π ( f ) ≈ S π ′ ( f )) � , we can extract a term s 2 such that for f : R → R and modulus g 1 : ( ∀ k 0 )( ∀ x , y ∈ [0 , 1])( | x − y | < g ( k ) → | f ( x ) − f ( y ) | < 1 1 k ) (3) ↓ ( ∀ k ′ )( ∀ π, π ′ ∈ P ([0 , 1])) � � s ( g , k ′ ) → | S π ( f ) − S π ′ ( f ) | ≤ 1 1 � π � , � π ′ � < k ′

  34. Introduction: NSA 101 Mining NSA Additional results The unreasonable effectiveness of NSA Example II: Continuity implies Riemann integration From a proof that nonstandard uniformly continuity implies nonstandard Riemann integration in P, i.e. � ( ∀ f : R → R ) ( ∀ x , y ∈ [0 , 1])[ x ≈ y → f ( x ) ≈ f ( y )] ↓ ( ∀ π, π ′ ∈ P ([0 , 1]))( � π � , � π ′ � ≈ 0 → S π ( f ) ≈ S π ′ ( f )) � , we can extract a term s 2 such that for f : R → R and modulus g 1 : ( ∀ k 0 )( ∀ x , y ∈ [0 , 1])( | x − y | < g ( k ) → | f ( x ) − f ( y ) | < 1 1 k ) (3) ↓ ( ∀ k ′ )( ∀ π, π ′ ∈ P ([0 , 1])) � � s ( g , k ′ ) → | S π ( f ) − S π ′ ( f ) | ≤ 1 1 � π � , � π ′ � < k ′ is provable in E-PA ω .

  35. Introduction: NSA 101 Mining NSA Additional results The unreasonable effectiveness of NSA Example II: Continuity implies Riemann integration From a proof that nonstandard uniformly continuity implies nonstandard Riemann integration in P, i.e. � ( ∀ f : R → R ) ( ∀ x , y ∈ [0 , 1])[ x ≈ y → f ( x ) ≈ f ( y )] ↓ ( ∀ π, π ′ ∈ P ([0 , 1]))( � π � , � π ′ � ≈ 0 → S π ( f ) ≈ S π ′ ( f )) � , we can extract a term s 2 such that for f : R → R and modulus g 1 : ( ∀ k 0 )( ∀ x , y ∈ [0 , 1])( | x − y | < g ( k ) → | f ( x ) − f ( y ) | < 1 1 k ) (3) ↓ ( ∀ k ′ )( ∀ π, π ′ ∈ P ([0 , 1])) � � s ( g , k ′ ) → | S π ( f ) − S π ′ ( f ) | ≤ 1 1 � π � , � π ′ � < k ′ is provable in E-PA ω . (and the same for E-HA ω )

  36. Introduction: NSA 101 Mining NSA Additional results The unreasonable effectiveness of NSA Example II: Continuity implies Riemann integration From a proof that nonstandard uniformly continuity implies nonstandard Riemann integration in P, i.e. � ( ∀ f : R → R ) ( ∀ x , y ∈ [0 , 1])[ x ≈ y → f ( x ) ≈ f ( y )] ↓ ( ∀ π, π ′ ∈ P ([0 , 1]))( � π � , � π ′ � ≈ 0 → S π ( f ) ≈ S π ′ ( f )) � , we can extract a term s 2 such that for f : R → R and modulus g 1 : ( ∀ k 0 )( ∀ x , y ∈ [0 , 1])( | x − y | < g ( k ) → | f ( x ) − f ( y ) | < 1 1 k ) (3) ↓ ( ∀ k ′ )( ∀ π, π ′ ∈ P ([0 , 1])) � � s ( g , k ′ ) → | S π ( f ) − S π ′ ( f ) | ≤ 1 1 � π � , � π ′ � < k ′ is provable in E-PA ω . (and the same for E-HA ω ) But (3) is the theorem expressing continuity implies Riemann integration from constructive analysis and computable math.

  37. Introduction: NSA 101 Mining NSA Additional results Explicit Reverse Mathematics Example III: The monotone convergence theorem

  38. Introduction: NSA 101 Mining NSA Additional results Explicit Reverse Mathematics Example III: The monotone convergence theorem From a proof in P of the following equivalence: � ( ∀ st f 1 ) ( ∃ n ) f ( n ) = 0 → ( ∃ st m ) f ( m ) = 0] (Π 0 1 -TRANS) ↔ Every standard monotone sequence in [0 , 1] nonstandard converges

  39. Introduction: NSA 101 Mining NSA Additional results Explicit Reverse Mathematics Example III: The monotone convergence theorem From a proof in P of the following equivalence: � ( ∀ st f 1 ) ( ∃ n ) f ( n ) = 0 → ( ∃ st m ) f ( m ) = 0] (Π 0 1 -TRANS) ↔ Every standard monotone sequence in [0 , 1] nonstandard converges two terms u , v can be extracted such that E-PA ω proves

  40. Introduction: NSA 101 Mining NSA Additional results Explicit Reverse Mathematics Example III: The monotone convergence theorem From a proof in P of the following equivalence: � ( ∀ st f 1 ) ( ∃ n ) f ( n ) = 0 → ( ∃ st m ) f ( m ) = 0] (Π 0 1 -TRANS) ↔ Every standard monotone sequence in [0 , 1] nonstandard converges two terms u , v can be extracted such that E-PA ω proves If Ξ 2 is the Turing jump functional, then u (Ξ) computes the rate of convergence of any monotone sequence in [0 , 1].

  41. Introduction: NSA 101 Mining NSA Additional results Explicit Reverse Mathematics Example III: The monotone convergence theorem From a proof in P of the following equivalence: � ( ∀ st f 1 ) ( ∃ n ) f ( n ) = 0 → ( ∃ st m ) f ( m ) = 0] (Π 0 1 -TRANS) ↔ Every standard monotone sequence in [0 , 1] nonstandard converges two terms u , v can be extracted such that E-PA ω proves If Ξ 2 is the Turing jump functional, then u (Ξ) computes the rate of convergence of any monotone sequence in [0 , 1]. If Ψ 1 → 1 computes the rate of convergence of any monotone sequence in [0 , 1], then v (Ψ) is the Turing jump functional.

  42. Introduction: NSA 101 Mining NSA Additional results Explicit Reverse Mathematics Example III: The monotone convergence theorem From a proof in P of the following equivalence: � ( ∀ st f 1 ) ( ∃ n ) f ( n ) = 0 → ( ∃ st m ) f ( m ) = 0] (Π 0 1 -TRANS) ↔ Every standard monotone sequence in [0 , 1] nonstandard converges two terms u , v can be extracted such that E-PA ω proves If Ξ 2 is the Turing jump functional, then u (Ξ) computes the rate of convergence of any monotone sequence in [0 , 1]. If Ψ 1 → 1 computes the rate of convergence of any monotone sequence in [0 , 1], then v (Ψ) is the Turing jump functional. The above is the EXPLICIT equivalence ACA 0 ↔ MCT.

  43. Introduction: NSA 101 Mining NSA Additional results Explicit Reverse Mathematics Example III: The monotone convergence theorem From a proof in P of the following equivalence: � ( ∀ st f 1 ) ( ∃ n ) f ( n ) = 0 → ( ∃ st m ) f ( m ) = 0] (Π 0 1 -TRANS) ↔ Every standard monotone sequence in [0 , 1] nonstandard converges two terms u , v can be extracted such that E-PA ω proves If Ξ 2 is the Turing jump functional, then u (Ξ) computes the rate of convergence of any monotone sequence in [0 , 1]. If Ψ 1 → 1 computes the rate of convergence of any monotone sequence in [0 , 1], then v (Ψ) is the Turing jump functional. The above is the EXPLICIT equivalence ACA 0 ↔ MCT. (and H?)

  44. Introduction: NSA 101 Mining NSA Additional results Explicit Reverse Mathematics Example IV: Group Theory

  45. Introduction: NSA 101 Mining NSA Additional results Explicit Reverse Mathematics Example IV: Group Theory From a proof in P of the following equivalence: � ( ∀ st f 1 ) ( ∃ g 1 )( ∀ n ) f ( gn ) = 0 → ( ∃ st g 1 )( ∀ st m ) f ( gm ) = 0] (Π 1 1 -TRANS) ↔ Every standard countable abelian group is a direct sum of a standard divisible group and a standard reduced group

  46. Introduction: NSA 101 Mining NSA Additional results Explicit Reverse Mathematics Example IV: Group Theory From a proof in P of the following equivalence: � ( ∀ st f 1 ) ( ∃ g 1 )( ∀ n ) f ( gn ) = 0 → ( ∃ st g 1 )( ∀ st m ) f ( gm ) = 0] (Π 1 1 -TRANS) ↔ Every standard countable abelian group is a direct sum of a standard divisible group and a standard reduced group two terms u , v can be extracted such that E-PA ω proves

  47. Introduction: NSA 101 Mining NSA Additional results Explicit Reverse Mathematics Example IV: Group Theory From a proof in P of the following equivalence: � ( ∀ st f 1 ) ( ∃ g 1 )( ∀ n ) f ( gn ) = 0 → ( ∃ st g 1 )( ∀ st m ) f ( gm ) = 0] (Π 1 1 -TRANS) ↔ Every standard countable abelian group is a direct sum of a standard divisible group and a standard reduced group two terms u , v can be extracted such that E-PA ω proves If Ξ 2 is the Suslin functional, then u (Ξ) computes the divisible and reduced group for countable abelian groups.

  48. Introduction: NSA 101 Mining NSA Additional results Explicit Reverse Mathematics Example IV: Group Theory From a proof in P of the following equivalence: � ( ∀ st f 1 ) ( ∃ g 1 )( ∀ n ) f ( gn ) = 0 → ( ∃ st g 1 )( ∀ st m ) f ( gm ) = 0] (Π 1 1 -TRANS) ↔ Every standard countable abelian group is a direct sum of a standard divisible group and a standard reduced group two terms u , v can be extracted such that E-PA ω proves If Ξ 2 is the Suslin functional, then u (Ξ) computes the divisible and reduced group for countable abelian groups. If Ψ 1 → 1 computes computes the divisible and reduced group for countable abelian groups, then v (Ψ) is the Suslin functional.

  49. Introduction: NSA 101 Mining NSA Additional results Explicit Reverse Mathematics Example IV: Group Theory From a proof in P of the following equivalence: � ( ∀ st f 1 ) ( ∃ g 1 )( ∀ n ) f ( gn ) = 0 → ( ∃ st g 1 )( ∀ st m ) f ( gm ) = 0] (Π 1 1 -TRANS) ↔ Every standard countable abelian group is a direct sum of a standard divisible group and a standard reduced group two terms u , v can be extracted such that E-PA ω proves If Ξ 2 is the Suslin functional, then u (Ξ) computes the divisible and reduced group for countable abelian groups. If Ψ 1 → 1 computes computes the divisible and reduced group for countable abelian groups, then v (Ψ) is the Suslin functional. The above is the EXPLICIT equivalence Π 1 1 -CA 0 ↔ DIV.

  50. Introduction: NSA 101 Mining NSA Additional results The unreasonable effectiveness of NSA Example V: Compactness

  51. Introduction: NSA 101 Mining NSA Additional results The unreasonable effectiveness of NSA Example V: Compactness X is nonstandard compact IFF ( ∀ x ∈ X )( ∃ st y ∈ X )( x ≈ y ).

  52. Introduction: NSA 101 Mining NSA Additional results The unreasonable effectiveness of NSA Example V: Compactness X is nonstandard compact IFF ( ∀ x ∈ X )( ∃ st y ∈ X )( x ≈ y ). From a proof in P of the following equivalence: [0 , 1] is nonstandard compact (STP) ↔ Every ns-cont. function is ns-Riemann integrable on [0 , 1]

  53. Introduction: NSA 101 Mining NSA Additional results The unreasonable effectiveness of NSA Example V: Compactness X is nonstandard compact IFF ( ∀ x ∈ X )( ∃ st y ∈ X )( x ≈ y ). From a proof in P of the following equivalence: [0 , 1] is nonstandard compact (STP) ↔ Every ns-cont. function is ns-Riemann integrable on [0 , 1] two terms u , v can be extracted such that E-PA ω proves

  54. Introduction: NSA 101 Mining NSA Additional results The unreasonable effectiveness of NSA Example V: Compactness X is nonstandard compact IFF ( ∀ x ∈ X )( ∃ st y ∈ X )( x ≈ y ). From a proof in P of the following equivalence: [0 , 1] is nonstandard compact (STP) ↔ Every ns-cont. function is ns-Riemann integrable on [0 , 1] two terms u , v can be extracted such that E-PA ω proves If Ω 3 is the fan functional, then u (Ω) computes the Riemann integral for any cont. function on [0 , 1].

  55. Introduction: NSA 101 Mining NSA Additional results The unreasonable effectiveness of NSA Example V: Compactness X is nonstandard compact IFF ( ∀ x ∈ X )( ∃ st y ∈ X )( x ≈ y ). From a proof in P of the following equivalence: [0 , 1] is nonstandard compact (STP) ↔ Every ns-cont. function is ns-Riemann integrable on [0 , 1] two terms u , v can be extracted such that E-PA ω proves If Ω 3 is the fan functional, then u (Ω) computes the Riemann integral for any cont. function on [0 , 1]. If Ψ (1 → 1) → 1 computes the Riemann integral for any. cont function on [0 , 1], then v (Ψ) is the fan functional.

  56. Introduction: NSA 101 Mining NSA Additional results The unreasonable effectiveness of NSA Example V: Compactness X is nonstandard compact IFF ( ∀ x ∈ X )( ∃ st y ∈ X )( x ≈ y ). From a proof in P of the following equivalence: [0 , 1] is nonstandard compact (STP) ↔ Every ns-cont. function is ns-Riemann integrable on [0 , 1] two terms u , v can be extracted such that E-PA ω proves If Ω 3 is the fan functional, then u (Ω) computes the Riemann integral for any cont. function on [0 , 1]. If Ψ (1 → 1) → 1 computes the Riemann integral for any. cont function on [0 , 1], then v (Ψ) is the fan functional. = the EXPLICIT version of FAN ↔ (cont → Rieman int. on [0 , 1]).

  57. Introduction: NSA 101 Mining NSA Additional results The unreasonable effectiveness of NSA Example VI: Compactness bis Compactness has multiple non-equivalent normal forms.

  58. Introduction: NSA 101 Mining NSA Additional results The unreasonable effectiveness of NSA Example VI: Compactness bis Compactness has multiple non-equivalent normal forms. In Example V, the normal form of ns-compactness was a nonstandard version of FAN.

  59. Introduction: NSA 101 Mining NSA Additional results The unreasonable effectiveness of NSA Example VI: Compactness bis Compactness has multiple non-equivalent normal forms. In Example V, the normal form of ns-compactness was a nonstandard version of FAN. Here, the normal form expresses ‘the space can be discretely divided into infinitesimal pieces’.

  60. Introduction: NSA 101 Mining NSA Additional results The unreasonable effectiveness of NSA Example VI: Compactness bis Compactness has multiple non-equivalent normal forms. In Example V, the normal form of ns-compactness was a nonstandard version of FAN. Here, the normal form expresses ‘the space can be discretely divided into infinitesimal pieces’. From a proof in P of the following theorem For a uniformly ns-cont. f and ns-compact X , f ( X ) is also ns-compact.

  61. Introduction: NSA 101 Mining NSA Additional results The unreasonable effectiveness of NSA Example VI: Compactness bis Compactness has multiple non-equivalent normal forms. In Example V, the normal form of ns-compactness was a nonstandard version of FAN. Here, the normal form expresses ‘the space can be discretely divided into infinitesimal pieces’. From a proof in P of the following theorem For a uniformly ns-cont. f and ns-compact X , f ( X ) is also ns-compact.

  62. Introduction: NSA 101 Mining NSA Additional results The unreasonable effectiveness of NSA Example VI: Compactness bis Compactness has multiple non-equivalent normal forms. In Example V, the normal form of ns-compactness was a nonstandard version of FAN. Here, the normal form expresses ‘the space can be discretely divided into infinitesimal pieces’. From a proof in P of the following theorem For a uniformly ns-cont. f and ns-compact X , f ( X ) is also ns-compact. a term u can be extracted such that E-PA ω proves If Ψ witnesses that X is totally bounded and g is a modulus of uniform cont. for f , then u (Ψ , g ) witnesses that f ( X ) is totally bounded.

  63. Introduction: NSA 101 Mining NSA Additional results The unreasonable effectiveness of NSA Example VI: Compactness bis Compactness has multiple non-equivalent normal forms. In Example V, the normal form of ns-compactness was a nonstandard version of FAN. Here, the normal form expresses ‘the space can be discretely divided into infinitesimal pieces’. From a proof in P of the following theorem For a uniformly ns-cont. f and ns-compact X , f ( X ) is also ns-compact. a term u can be extracted such that E-PA ω proves If Ψ witnesses that X is totally bounded and g is a modulus of uniform cont. for f , then u (Ψ , g ) witnesses that f ( X ) is totally bounded. . . . which is a theorem from constructive analysis and comp. math.

  64. Introduction: NSA 101 Mining NSA Additional results Conclusion Nonstandard Analysis is unreasonably effective as follows:

  65. Introduction: NSA 101 Mining NSA Additional results Conclusion Nonstandard Analysis is unreasonably effective as follows: a) One should focus on theorems of pure NSA, i.e. involving the nonstandard definitions of continuity, differentiation, Riemann integration, compactness, open sets, et cetera.

  66. Introduction: NSA 101 Mining NSA Additional results Conclusion Nonstandard Analysis is unreasonably effective as follows: a) One should focus on theorems of pure NSA, i.e. involving the nonstandard definitions of continuity, differentiation, Riemann integration, compactness, open sets, et cetera. b) One must work in a system P which has TERM EXTRACTION.

  67. Introduction: NSA 101 Mining NSA Additional results Conclusion Nonstandard Analysis is unreasonably effective as follows: a) One should focus on theorems of pure NSA, i.e. involving the nonstandard definitions of continuity, differentiation, Riemann integration, compactness, open sets, et cetera. b) One must work in a system P which has TERM EXTRACTION. In particular:

  68. Introduction: NSA 101 Mining NSA Additional results Conclusion Nonstandard Analysis is unreasonably effective as follows: a) One should focus on theorems of pure NSA, i.e. involving the nonstandard definitions of continuity, differentiation, Riemann integration, compactness, open sets, et cetera. b) One must work in a system P which has TERM EXTRACTION. In particular: a) Observation: Every theorem of pure NSA can be brought into the normal form ( ∀ st x )( ∃ st y ) ϕ ( x , y ) ( ϕ internal).

  69. Introduction: NSA 101 Mining NSA Additional results Conclusion Nonstandard Analysis is unreasonably effective as follows: a) One should focus on theorems of pure NSA, i.e. involving the nonstandard definitions of continuity, differentiation, Riemann integration, compactness, open sets, et cetera. b) One must work in a system P which has TERM EXTRACTION. In particular: a) Observation: Every theorem of pure NSA can be brought into the normal form ( ∀ st x )( ∃ st y ) ϕ ( x , y ) ( ϕ internal). b) P has the TERM EXTRACTION property for normal forms:

  70. Introduction: NSA 101 Mining NSA Additional results Conclusion Nonstandard Analysis is unreasonably effective as follows: a) One should focus on theorems of pure NSA, i.e. involving the nonstandard definitions of continuity, differentiation, Riemann integration, compactness, open sets, et cetera. b) One must work in a system P which has TERM EXTRACTION. In particular: a) Observation: Every theorem of pure NSA can be brought into the normal form ( ∀ st x )( ∃ st y ) ϕ ( x , y ) ( ϕ internal). b) P has the TERM EXTRACTION property for normal forms: If P proves ( ∀ st x )( ∃ st y ) ϕ ( x , y ), then from the latter proof, a term t can be extracted such that E-PA ω proves ( ∀ x )( ∃ y ∈ t ( x )) ϕ ( x , y )

  71. Introduction: NSA 101 Mining NSA Additional results Conclusion Nonstandard Analysis is unreasonably effective as follows: a) One should focus on theorems of pure NSA, i.e. involving the nonstandard definitions of continuity, differentiation, Riemann integration, compactness, open sets, et cetera. b) One must work in a system P which has TERM EXTRACTION. In particular: a) Observation: Every theorem of pure NSA can be brought into the normal form ( ∀ st x )( ∃ st y ) ϕ ( x , y ) ( ϕ internal). b) P has the TERM EXTRACTION property for normal forms: If P proves ( ∀ st x )( ∃ st y ) ϕ ( x , y ), then from the latter proof, a term t can be extracted such that E-PA ω proves ( ∀ x )( ∃ y ∈ t ( x )) ϕ ( x , y ) (a number of systems have the term extraction property)

  72. Introduction: NSA 101 Mining NSA Additional results Towards meta-equivalence: Hebrandisations

  73. Introduction: NSA 101 Mining NSA Additional results Towards meta-equivalence: Hebrandisations From a proof that nonstandard uniformly continuity implies nonstandard Riemann integration in P, i.e.

  74. Introduction: NSA 101 Mining NSA Additional results Towards meta-equivalence: Hebrandisations From a proof that nonstandard uniformly continuity implies nonstandard Riemann integration in P, i.e. � ( ∀ f : R → R ) ( ∀ x , y ∈ [0 , 1])[ x ≈ y → f ( x ) ≈ f ( y )] ↓ (4) ( ∀ π, π ′ ∈ P ([0 , 1]))( � π � , � π ′ � ≈ 0 → S π ( f ) ≈ S π ′ ( f )) � ,

  75. Introduction: NSA 101 Mining NSA Additional results Towards meta-equivalence: Hebrandisations From a proof that nonstandard uniformly continuity implies nonstandard Riemann integration in P, i.e. � ( ∀ f : R → R ) ( ∀ x , y ∈ [0 , 1])[ x ≈ y → f ( x ) ≈ f ( y )] ↓ (4) ( ∀ π, π ′ ∈ P ([0 , 1]))( � π � , � π ′ � ≈ 0 → S π ( f ) ≈ S π ′ ( f )) � , we can extract terms i , o such that for all f , g : R → R , and ε ′ > 0: ( ∀ x , y ∈ [0 , 1] , ε > i ( g , ε ′ ))( | x − y | < g ( ε ) → | f ( x ) − f ( y ) | < ε ) ↓ (5) ( ∀ π, π ′ ∈ P ([0 , 1])) � � π � , � π ′ � < o ( g , ε ′ ) → | S π ( f ) − S π ′ ( f ) | ≤ ε ′ �

  76. Introduction: NSA 101 Mining NSA Additional results Towards meta-equivalence: Hebrandisations From a proof that nonstandard uniformly continuity implies nonstandard Riemann integration in P, i.e. � ( ∀ f : R → R ) ( ∀ x , y ∈ [0 , 1])[ x ≈ y → f ( x ) ≈ f ( y )] ↓ (4) ( ∀ π, π ′ ∈ P ([0 , 1]))( � π � , � π ′ � ≈ 0 → S π ( f ) ≈ S π ′ ( f )) � , we can extract terms i , o such that for all f , g : R → R , and ε ′ > 0: ( ∀ x , y ∈ [0 , 1] , ε > i ( g , ε ′ ))( | x − y | < g ( ε ) → | f ( x ) − f ( y ) | < ε ) ↓ (5) ( ∀ π, π ′ ∈ P ([0 , 1])) � � π � , � π ′ � < o ( g , ε ′ ) → | S π ( f ) − S π ′ ( f ) | ≤ ε ′ � is provable in E-PA ω ,

  77. Introduction: NSA 101 Mining NSA Additional results Towards meta-equivalence: Hebrandisations From a proof that nonstandard uniformly continuity implies nonstandard Riemann integration in P, i.e. � ( ∀ f : R → R ) ( ∀ x , y ∈ [0 , 1])[ x ≈ y → f ( x ) ≈ f ( y )] ↓ (4) ( ∀ π, π ′ ∈ P ([0 , 1]))( � π � , � π ′ � ≈ 0 → S π ( f ) ≈ S π ′ ( f )) � , we can extract terms i , o such that for all f , g : R → R , and ε ′ > 0: ( ∀ x , y ∈ [0 , 1] , ε > i ( g , ε ′ ))( | x − y | < g ( ε ) → | f ( x ) − f ( y ) | < ε ) ↓ (5) ( ∀ π, π ′ ∈ P ([0 , 1])) � � π � , � π ′ � < o ( g , ε ′ ) → | S π ( f ) − S π ′ ( f ) | ≤ ε ′ � is provable in E-PA ω , AND VICE VERSA: if E-PA ω ⊢ (5), then P ⊢ (4)

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend