The unreasonable effectiveness of Nonstandard Analysis Sam Sanders - - PowerPoint PPT Presentation

the unreasonable effectiveness of nonstandard analysis
SMART_READER_LITE
LIVE PREVIEW

The unreasonable effectiveness of Nonstandard Analysis Sam Sanders - - PowerPoint PPT Presentation

The unreasonable effectiveness of Nonstandard Analysis Sam Sanders CCC, Kochel, Sept. 2015 Introduction: NSA 101 Mining NSA Additional results Aim and motivation Aim: To show that proofs of theorems of PURE Nonstandard Analysis can be mined


slide-1
SLIDE 1

The unreasonable effectiveness of Nonstandard Analysis

Sam Sanders CCC, Kochel, Sept. 2015

slide-2
SLIDE 2

Introduction: NSA 101 Mining NSA Additional results

Aim and motivation

Aim: To show that proofs of theorems of PURE Nonstandard Analysis can be mined to produce effective theorems not involving NSA, and vice versa.

slide-3
SLIDE 3

Introduction: NSA 101 Mining NSA Additional results

Aim and motivation

Aim: To show that proofs of theorems of PURE Nonstandard Analysis can be mined to produce effective theorems not involving NSA, and vice versa. PURE Nonstandard Analysis = only involving the nonstandard definitions (of continuity, compactness, diff., Riemann int., . . . )

slide-4
SLIDE 4

Introduction: NSA 101 Mining NSA Additional results

Aim and motivation

Aim: To show that proofs of theorems of PURE Nonstandard Analysis can be mined to produce effective theorems not involving NSA, and vice versa. PURE Nonstandard Analysis = only involving the nonstandard definitions (of continuity, compactness, diff., Riemann int., . . . ) Effective theorem = Theorem from constructive/computable analysis OR an (explicit) equivalence from Reverse Math.

slide-5
SLIDE 5

Introduction: NSA 101 Mining NSA Additional results

Aim and motivation

Aim: To show that proofs of theorems of PURE Nonstandard Analysis can be mined to produce effective theorems not involving NSA, and vice versa. PURE Nonstandard Analysis = only involving the nonstandard definitions (of continuity, compactness, diff., Riemann int., . . . ) Effective theorem = Theorem from constructive/computable analysis OR an (explicit) equivalence from Reverse Math. Vice versa? Certain effective theorems, called Herbrandisations, imply the nonstandard theorem from which they were obtained!

slide-6
SLIDE 6

Introduction: NSA 101 Mining NSA Additional results

Aim and motivation

Aim: To show that proofs of theorems of PURE Nonstandard Analysis can be mined to produce effective theorems not involving NSA, and vice versa. PURE Nonstandard Analysis = only involving the nonstandard definitions (of continuity, compactness, diff., Riemann int., . . . ) Effective theorem = Theorem from constructive/computable analysis OR an (explicit) equivalence from Reverse Math. Vice versa? Certain effective theorems, called Herbrandisations, imply the nonstandard theorem from which they were obtained! Motivation: Many authors have observed the ‘constructive nature’

  • f the practice of NSA. (Horst Osswald’s local constructivity)
slide-7
SLIDE 7

Introduction: NSA 101 Mining NSA Additional results

Introducing Nonstandard Analysis

Robinson’s semantic approach (1965):

slide-8
SLIDE 8

Introduction: NSA 101 Mining NSA Additional results

Introducing Nonstandard Analysis

Robinson’s semantic approach (1965): For a given structure M, build

∗M M, a nonstandard model of M (using free ultrafilter).

slide-9
SLIDE 9

Introduction: NSA 101 Mining NSA Additional results

Introducing Nonstandard Analysis

Robinson’s semantic approach (1965): For a given structure M, build

∗M M, a nonstandard model of M (using free ultrafilter).

M

∗M

slide-10
SLIDE 10

Introduction: NSA 101 Mining NSA Additional results

Introducing Nonstandard Analysis

Robinson’s semantic approach (1965): For a given structure M, build

∗M M, a nonstandard model of M (using free ultrafilter).

M

∗M

N = {0, 1, 2, . . . }

slide-11
SLIDE 11

Introduction: NSA 101 Mining NSA Additional results

Introducing Nonstandard Analysis

Robinson’s semantic approach (1965): For a given structure M, build

∗M M, a nonstandard model of M (using free ultrafilter).

M

∗M

N = {0, 1, 2, . . . }

∗N = {0, 1, 2, . . . . . . , ω, ω + 1, . . . }

slide-12
SLIDE 12

Introduction: NSA 101 Mining NSA Additional results

Introducing Nonstandard Analysis

Robinson’s semantic approach (1965): For a given structure M, build

∗M M, a nonstandard model of M (using free ultrafilter).

M

∗M

N = {0, 1, 2, . . . }

∗N = {0, 1, 2, . . . . . . , ω, ω + 1, ω + 2, ω + 3, . . .

  • nonstandard objects not in N

}

slide-13
SLIDE 13

Introduction: NSA 101 Mining NSA Additional results

Introducing Nonstandard Analysis

Robinson’s semantic approach (1965): For a given structure M, build

∗M M, a nonstandard model of M (using free ultrafilter).

M

∗M

N = {0, 1, 2, . . . }

∗N = {0, 1, 2, . . . . . . , ω, ω + 1, ω + 2, ω + 3, . . .

  • nonstandard objects not in N

}

X ∈ M

∗X ∈ ∗M

slide-14
SLIDE 14

Introduction: NSA 101 Mining NSA Additional results

Introducing Nonstandard Analysis

Robinson’s semantic approach (1965): For a given structure M, build

∗M M, a nonstandard model of M (using free ultrafilter).

M

∗M

N = {0, 1, 2, . . . }

∗N = {0, 1, 2, . . . . . . , ω, ω + 1, ω + 2, ω + 3, . . .

  • nonstandard objects not in N

}

X ∈ M

∗X ∈ ∗M

star morphism

slide-15
SLIDE 15

Introduction: NSA 101 Mining NSA Additional results

Introducing Nonstandard Analysis

Robinson’s semantic approach (1965): For a given structure M, build

∗M M, a nonstandard model of M (using free ultrafilter).

M

∗M

N = {0, 1, 2, . . . }

∗N = {0, 1, 2, . . . . . . , ω, ω + 1, ω + 2, ω + 3, . . .

  • nonstandard objects not in N

}

X ∈ M

∗X ∈ ∗M

star morphism X contains the standard objects

slide-16
SLIDE 16

Introduction: NSA 101 Mining NSA Additional results

Introducing Nonstandard Analysis

Robinson’s semantic approach (1965): For a given structure M, build

∗M M, a nonstandard model of M (using free ultrafilter).

M

∗M

N = {0, 1, 2, . . . }

∗N = {0, 1, 2, . . . . . . , ω, ω + 1, ω + 2, ω + 3, . . .

  • nonstandard objects not in N

}

X ∈ M

∗X ∈ ∗M

star morphism X contains the standard objects

∗X \ X contains the nonstandard objects

slide-17
SLIDE 17

Introduction: NSA 101 Mining NSA Additional results

Introducing Nonstandard Analysis

Robinson’s semantic approach (1965): For a given structure M, build

∗M M, a nonstandard model of M (using free ultrafilter).

M

∗M

N = {0, 1, 2, . . . }

∗N = {0, 1, 2, . . . . . . , ω, ω + 1, ω + 2, ω + 3, . . .

  • nonstandard objects not in N

}

X ∈ M

∗X ∈ ∗M

star morphism X contains the standard objects

∗X \ X contains the nonstandard objects

Three important properties connecting M and ∗M:

slide-18
SLIDE 18

Introduction: NSA 101 Mining NSA Additional results

Introducing Nonstandard Analysis

Robinson’s semantic approach (1965): For a given structure M, build

∗M M, a nonstandard model of M (using free ultrafilter).

M

∗M

N = {0, 1, 2, . . . }

∗N = {0, 1, 2, . . . . . . , ω, ω + 1, ω + 2, ω + 3, . . .

  • nonstandard objects not in N

}

X ∈ M

∗X ∈ ∗M

star morphism X contains the standard objects

∗X \ X contains the nonstandard objects

Three important properties connecting M and ∗M: 1) Transfer M ϕ ↔ ∗M ∗ϕ (ϕ ∈ LZFC)

slide-19
SLIDE 19

Introduction: NSA 101 Mining NSA Additional results

Introducing Nonstandard Analysis

Robinson’s semantic approach (1965): For a given structure M, build

∗M M, a nonstandard model of M (using free ultrafilter).

M

∗M

N = {0, 1, 2, . . . }

∗N = {0, 1, 2, . . . . . . , ω, ω + 1, ω + 2, ω + 3, . . .

  • nonstandard objects not in N

}

X ∈ M

∗X ∈ ∗M

star morphism X contains the standard objects

∗X \ X contains the nonstandard objects

Three important properties connecting M and ∗M: 1) Transfer M ϕ ↔ ∗M ∗ϕ (ϕ ∈ LZFC) 2) Standard Part (∀x ∈ ∗M)(∃y ∈ M)(∀z ∈ M)(z ∈ x ↔ z ∈ y)

slide-20
SLIDE 20

Introduction: NSA 101 Mining NSA Additional results

Introducing Nonstandard Analysis

Robinson’s semantic approach (1965): For a given structure M, build

∗M M, a nonstandard model of M (using free ultrafilter).

M

∗M

N = {0, 1, 2, . . . }

∗N = {0, 1, 2, . . . . . . , ω, ω + 1, ω + 2, ω + 3, . . .

  • nonstandard objects not in N

}

X ∈ M

∗X ∈ ∗M

star morphism X contains the standard objects

∗X \ X contains the nonstandard objects

Three important properties connecting M and ∗M: 1) Transfer M ϕ ↔ ∗M ∗ϕ (ϕ ∈ LZFC) 2) Standard Part (∀x ∈ ∗M)(∃y ∈ M)(∀z ∈ M)(z ∈ x ↔ z ∈ y)(reverse of ∗)

slide-21
SLIDE 21

Introduction: NSA 101 Mining NSA Additional results

Introducing Nonstandard Analysis

Robinson’s semantic approach (1965): For a given structure M, build

∗M M, a nonstandard model of M (using free ultrafilter).

M

∗M

N = {0, 1, 2, . . . }

∗N = {0, 1, 2, . . . . . . , ω, ω + 1, ω + 2, ω + 3, . . .

  • nonstandard objects not in N

}

X ∈ M

∗X ∈ ∗M

star morphism X contains the standard objects

∗X \ X contains the nonstandard objects

Three important properties connecting M and ∗M: 1) Transfer M ϕ ↔ ∗M ∗ϕ (ϕ ∈ LZFC) 2) Standard Part (∀x ∈ ∗M)(∃y ∈ M)(∀z ∈ M)(z ∈ x ↔ z ∈ y)(reverse of ∗) 3) Idealization/Saturation . . .

slide-22
SLIDE 22

Introduction: NSA 101 Mining NSA Additional results

Introducing Nonstandard Analysis

Nelson’s Internal Set Theory is a syntactic approach to Nonstandard Analysis.

slide-23
SLIDE 23

Introduction: NSA 101 Mining NSA Additional results

Introducing Nonstandard Analysis

Nelson’s Internal Set Theory is a syntactic approach to Nonstandard Analysis.

Add a new predicate st(x) read ‘x is standard’ to LZFC.

slide-24
SLIDE 24

Introduction: NSA 101 Mining NSA Additional results

Introducing Nonstandard Analysis

Nelson’s Internal Set Theory is a syntactic approach to Nonstandard Analysis.

Add a new predicate st(x) read ‘x is standard’ to LZFC. We write (∃stx) and (∀sty) for (∃x)(st(x) ∧ . . . ) and (∀y)(st(y) → . . . ).

slide-25
SLIDE 25

Introduction: NSA 101 Mining NSA Additional results

Introducing Nonstandard Analysis

Nelson’s Internal Set Theory is a syntactic approach to Nonstandard Analysis.

Add a new predicate st(x) read ‘x is standard’ to LZFC. We write (∃stx) and (∀sty) for (∃x)(st(x) ∧ . . . ) and (∀y)(st(y) → . . . ). A formula is internal if it does not contain ‘st’; external otherwise

slide-26
SLIDE 26

Introduction: NSA 101 Mining NSA Additional results

Introducing Nonstandard Analysis

Nelson’s Internal Set Theory is a syntactic approach to Nonstandard Analysis.

Add a new predicate st(x) read ‘x is standard’ to LZFC. We write (∃stx) and (∀sty) for (∃x)(st(x) ∧ . . . ) and (∀y)(st(y) → . . . ). A formula is internal if it does not contain ‘st’; external otherwise

Internal Set Theory IST is ZFC plus the new axioms:

slide-27
SLIDE 27

Introduction: NSA 101 Mining NSA Additional results

Introducing Nonstandard Analysis

Nelson’s Internal Set Theory is a syntactic approach to Nonstandard Analysis.

Add a new predicate st(x) read ‘x is standard’ to LZFC. We write (∃stx) and (∀sty) for (∃x)(st(x) ∧ . . . ) and (∀y)(st(y) → . . . ). A formula is internal if it does not contain ‘st’; external otherwise

Internal Set Theory IST is ZFC plus the new axioms:

Transfer: (∀stx)ϕ(x, t) → (∀x)ϕ(x, t) for internal ϕ and standard t.

slide-28
SLIDE 28

Introduction: NSA 101 Mining NSA Additional results

Introducing Nonstandard Analysis

Nelson’s Internal Set Theory is a syntactic approach to Nonstandard Analysis.

Add a new predicate st(x) read ‘x is standard’ to LZFC. We write (∃stx) and (∀sty) for (∃x)(st(x) ∧ . . . ) and (∀y)(st(y) → . . . ). A formula is internal if it does not contain ‘st’; external otherwise

Internal Set Theory IST is ZFC plus the new axioms:

Transfer: (∀stx)ϕ(x, t) → (∀x)ϕ(x, t) for internal ϕ and standard t. Standard Part: (∀x)(∃sty)(∀stz)(z ∈ x ↔ z ∈ y).

slide-29
SLIDE 29

Introduction: NSA 101 Mining NSA Additional results

Introducing Nonstandard Analysis

Nelson’s Internal Set Theory is a syntactic approach to Nonstandard Analysis.

Add a new predicate st(x) read ‘x is standard’ to LZFC. We write (∃stx) and (∀sty) for (∃x)(st(x) ∧ . . . ) and (∀y)(st(y) → . . . ). A formula is internal if it does not contain ‘st’; external otherwise

Internal Set Theory IST is ZFC plus the new axioms:

Transfer: (∀stx)ϕ(x, t) → (∀x)ϕ(x, t) for internal ϕ and standard t. Standard Part: (∀x)(∃sty)(∀stz)(z ∈ x ↔ z ∈ y). Idealization:. . . (push quantifiers (∀stx) and (∃sty) to the front)

slide-30
SLIDE 30

Introduction: NSA 101 Mining NSA Additional results

Introducing Nonstandard Analysis

Nelson’s Internal Set Theory is a syntactic approach to Nonstandard Analysis.

Add a new predicate st(x) read ‘x is standard’ to LZFC. We write (∃stx) and (∀sty) for (∃x)(st(x) ∧ . . . ) and (∀y)(st(y) → . . . ). A formula is internal if it does not contain ‘st’; external otherwise

Internal Set Theory IST is ZFC plus the new axioms:

Transfer: (∀stx)ϕ(x, t) → (∀x)ϕ(x, t) for internal ϕ and standard t. Standard Part: (∀x)(∃sty)(∀stz)(z ∈ x ↔ z ∈ y). Idealization:. . . (push quantifiers (∀stx) and (∃sty) to the front)

Conservation: ZFC and IST prove the same internal sentences.

slide-31
SLIDE 31

Introduction: NSA 101 Mining NSA Additional results

Introducing Nonstandard Analysis

Nelson’s Internal Set Theory is a syntactic approach to Nonstandard Analysis.

Add a new predicate st(x) read ‘x is standard’ to LZFC. We write (∃stx) and (∀sty) for (∃x)(st(x) ∧ . . . ) and (∀y)(st(y) → . . . ). A formula is internal if it does not contain ‘st’; external otherwise

Internal Set Theory IST is ZFC plus the new axioms:

Transfer: (∀stx)ϕ(x, t) → (∀x)ϕ(x, t) for internal ϕ and standard t. Standard Part: (∀x)(∃sty)(∀stz)(z ∈ x ↔ z ∈ y). Idealization:. . . (push quantifiers (∀stx) and (∃sty) to the front)

Conservation: ZFC and IST prove the same internal sentences. And analogous results for fragments of IST.

slide-32
SLIDE 32

Introduction: NSA 101 Mining NSA Additional results

A fragment based on G¨

  • del’s T

van den Berg, Briseid, Safarik, A functional interpretation of nonstandard arithmetic, APAL2012

slide-33
SLIDE 33

Introduction: NSA 101 Mining NSA Additional results

A fragment based on G¨

  • del’s T

van den Berg, Briseid, Safarik, A functional interpretation of nonstandard arithmetic, APAL2012 E-PAω is Peano arithmetic in all finite types with the axiom of extensionality.

slide-34
SLIDE 34

Introduction: NSA 101 Mining NSA Additional results

A fragment based on G¨

  • del’s T

van den Berg, Briseid, Safarik, A functional interpretation of nonstandard arithmetic, APAL2012 E-PAω is Peano arithmetic in all finite types with the axiom of extensionality. I is Nelson’s idealisation axiom in the language of finite types.

slide-35
SLIDE 35

Introduction: NSA 101 Mining NSA Additional results

A fragment based on G¨

  • del’s T

van den Berg, Briseid, Safarik, A functional interpretation of nonstandard arithmetic, APAL2012 E-PAω is Peano arithmetic in all finite types with the axiom of extensionality. I is Nelson’s idealisation axiom in the language of finite types. HACint is a weak version of Nelson’s Standard Part axiom:

slide-36
SLIDE 36

Introduction: NSA 101 Mining NSA Additional results

A fragment based on G¨

  • del’s T

van den Berg, Briseid, Safarik, A functional interpretation of nonstandard arithmetic, APAL2012 E-PAω is Peano arithmetic in all finite types with the axiom of extensionality. I is Nelson’s idealisation axiom in the language of finite types. HACint is a weak version of Nelson’s Standard Part axiom: (∀stxρ)(∃styτ)ϕ(x, y) → (∃stf ρ→τ ∗)(∀stxρ)(∃yτ ∈ f (x))ϕ(x, y) Only a finite sequence of witnesses; ϕ is internal.

slide-37
SLIDE 37

Introduction: NSA 101 Mining NSA Additional results

A fragment based on G¨

  • del’s T

van den Berg, Briseid, Safarik, A functional interpretation of nonstandard arithmetic, APAL2012 E-PAω is Peano arithmetic in all finite types with the axiom of extensionality. I is Nelson’s idealisation axiom in the language of finite types. HACint is a weak version of Nelson’s Standard Part axiom: (∀stxρ)(∃styτ)ϕ(x, y) → (∃stf ρ→τ ∗)(∀stxρ)(∃yτ ∈ f (x))ϕ(x, y) Only a finite sequence of witnesses; ϕ is internal. P := E-PAω + I + HACint is a conservative extension of E-PAω.

slide-38
SLIDE 38

Introduction: NSA 101 Mining NSA Additional results

A fragment based on G¨

  • del’s T

van den Berg, Briseid, Safarik, A functional interpretation of nonstandard arithmetic, APAL2012 E-PAω is Peano arithmetic in all finite types with the axiom of extensionality. I is Nelson’s idealisation axiom in the language of finite types. HACint is a weak version of Nelson’s Standard Part axiom: (∀stxρ)(∃styτ)ϕ(x, y) → (∃stf ρ→τ ∗)(∀stxρ)(∃yτ ∈ f (x))ϕ(x, y) Only a finite sequence of witnesses; ϕ is internal. P := E-PAω + I + HACint is a conservative extension of E-PAω. Same for nonstandard version H of E-HAω and intuitionistic logic.

slide-39
SLIDE 39

Introduction: NSA 101 Mining NSA Additional results

A new computational aspect of NSA

slide-40
SLIDE 40

Introduction: NSA 101 Mining NSA Additional results

A new computational aspect of NSA

TERM EXTRACTION

slide-41
SLIDE 41

Introduction: NSA 101 Mining NSA Additional results

A new computational aspect of NSA

TERM EXTRACTION van den Berg, Briseid, Safarik, A functional interpretation of nonstandard arithmetic, APAL2012

slide-42
SLIDE 42

Introduction: NSA 101 Mining NSA Additional results

A new computational aspect of NSA

TERM EXTRACTION van den Berg, Briseid, Safarik, A functional interpretation of nonstandard arithmetic, APAL2012 If system P (resp. H) proves (∀stx)(∃sty)ϕ(x, y) (ϕ internal)

slide-43
SLIDE 43

Introduction: NSA 101 Mining NSA Additional results

A new computational aspect of NSA

TERM EXTRACTION van den Berg, Briseid, Safarik, A functional interpretation of nonstandard arithmetic, APAL2012 If system P (resp. H) proves (∀stx)(∃sty)ϕ(x, y) (ϕ internal) then a term t can be extracted from this proof such that E-PAω (resp. E-HAω) proves (∀x)(∃y ∈ t(x))ϕ(x, y).

slide-44
SLIDE 44

Introduction: NSA 101 Mining NSA Additional results

A new computational aspect of NSA

TERM EXTRACTION van den Berg, Briseid, Safarik, A functional interpretation of nonstandard arithmetic, APAL2012 If system P (resp. H) proves (∀stx)(∃sty)ϕ(x, y) (ϕ internal) then a term t can be extracted from this proof such that E-PAω (resp. E-HAω) proves (∀x)(∃y ∈ t(x))ϕ(x, y). OBSERVATION: Nonstandard definitions (of continuity, compactness, Riemann int., etc) can be brought into the ‘normal form’ (∀stx)(∃sty)ϕ(x, y).

slide-45
SLIDE 45

Introduction: NSA 101 Mining NSA Additional results

A new computational aspect of NSA

TERM EXTRACTION van den Berg, Briseid, Safarik, A functional interpretation of nonstandard arithmetic, APAL2012 If system P (resp. H) proves (∀stx)(∃sty)ϕ(x, y) (ϕ internal) then a term t can be extracted from this proof such that E-PAω (resp. E-HAω) proves (∀x)(∃y ∈ t(x))ϕ(x, y). OBSERVATION: Nonstandard definitions (of continuity, compactness, Riemann int., etc) can be brought into the ‘normal form’ (∀stx)(∃sty)ϕ(x, y). Such normal forms are closed under modes ponens (in both P and H)

slide-46
SLIDE 46

Introduction: NSA 101 Mining NSA Additional results

A new computational aspect of NSA

TERM EXTRACTION van den Berg, Briseid, Safarik, A functional interpretation of nonstandard arithmetic, APAL2012 If system P (resp. H) proves (∀stx)(∃sty)ϕ(x, y) (ϕ internal) then a term t can be extracted from this proof such that E-PAω (resp. E-HAω) proves (∀x)(∃y ∈ t(x))ϕ(x, y). OBSERVATION: Nonstandard definitions (of continuity, compactness, Riemann int., etc) can be brought into the ‘normal form’ (∀stx)(∃sty)ϕ(x, y). Such normal forms are closed under modes ponens (in both P and H) All theorems of PURE Nonstandard Analysis can be mined using the term extraction result (of P and H).

slide-47
SLIDE 47

Introduction: NSA 101 Mining NSA Additional results

The unreasonable effectiveness of NSA

Example I: Continuity.

slide-48
SLIDE 48

Introduction: NSA 101 Mining NSA Additional results

The unreasonable effectiveness of NSA

Example I: Continuity. From a proof that f is nonstandard uniformly continuous in P, i.e. (∀x, y ∈ [0, 1])(x ≈ y → f (x) ≈ f (y)),

slide-49
SLIDE 49

Introduction: NSA 101 Mining NSA Additional results

The unreasonable effectiveness of NSA

Example I: Continuity. From a proof that f is nonstandard uniformly continuous in P, i.e. (∀x, y ∈ [0, 1])(x ≈ y → f (x) ≈ f (y)), (1) we can extract a term t1 (from G¨

  • del’s T) such that E-PAω proves

(∀k0)(∀x, y ∈ [0, 1])(|x − y| <

1 t(k) → |f (x) − f (y)| < 1 k ),

(2)

slide-50
SLIDE 50

Introduction: NSA 101 Mining NSA Additional results

The unreasonable effectiveness of NSA

Example I: Continuity. From a proof that f is nonstandard uniformly continuous in P, i.e. (∀x, y ∈ [0, 1])(x ≈ y → f (x) ≈ f (y)), (1) we can extract a term t1 (from G¨

  • del’s T) such that E-PAω proves

(∀k0)(∀x, y ∈ [0, 1])(|x − y| <

1 t(k) → |f (x) − f (y)| < 1 k ),

(2) AND VICE VERSA: E-PAω ⊢ (2) implies P ⊢ (1).

slide-51
SLIDE 51

Introduction: NSA 101 Mining NSA Additional results

The unreasonable effectiveness of NSA

Example I: Continuity. From a proof that f is nonstandard uniformly continuous in P, i.e. (∀x, y ∈ [0, 1])(x ≈ y → f (x) ≈ f (y)), (1) we can extract a term t1 (from G¨

  • del’s T) such that E-PAω proves

(∀k0)(∀x, y ∈ [0, 1])(|x − y| <

1 t(k) → |f (x) − f (y)| < 1 k ),

(2) AND VICE VERSA: E-PAω ⊢ (2) implies P ⊢ (1). (2) is the notion of continuity (with a modulus t) used in constructive analysis and computable math (Bishop, etc).

slide-52
SLIDE 52

Introduction: NSA 101 Mining NSA Additional results

The unreasonable effectiveness of NSA

Example I: Continuity. From a proof that f is nonstandard uniformly continuous in P, i.e. (∀x, y ∈ [0, 1])(x ≈ y → f (x) ≈ f (y)), (1) we can extract a term t1 (from G¨

  • del’s T) such that E-PAω proves

(∀k0)(∀x, y ∈ [0, 1])(|x − y| <

1 t(k) → |f (x) − f (y)| < 1 k ),

(2) AND VICE VERSA: E-PAω ⊢ (2) implies P ⊢ (1). (2) is the notion of continuity (with a modulus t) used in constructive analysis and computable math (Bishop, etc). Et pour les constructivists: la mˆ eme chose!

slide-53
SLIDE 53

Introduction: NSA 101 Mining NSA Additional results

The unreasonable effectiveness of NSA

Example II: Continuity implies Riemann integration

slide-54
SLIDE 54

Introduction: NSA 101 Mining NSA Additional results

The unreasonable effectiveness of NSA

Example II: Continuity implies Riemann integration

From a proof that nonstandard uniformly continuity implies nonstandard Riemann integration in P, i.e.

slide-55
SLIDE 55

Introduction: NSA 101 Mining NSA Additional results

The unreasonable effectiveness of NSA

Example II: Continuity implies Riemann integration

From a proof that nonstandard uniformly continuity implies nonstandard Riemann integration in P, i.e.

(∀f : R → R)

  • (∀x, y ∈ [0, 1])[x ≈ y → f (x) ≈ f (y)]

↓ (∀π, π′ ∈ P([0, 1]))(π, π′ ≈ 0 → Sπ(f ) ≈ Sπ′(f ))

  • ,
slide-56
SLIDE 56

Introduction: NSA 101 Mining NSA Additional results

The unreasonable effectiveness of NSA

Example II: Continuity implies Riemann integration

From a proof that nonstandard uniformly continuity implies nonstandard Riemann integration in P, i.e.

(∀f : R → R)

  • (∀x, y ∈ [0, 1])[x ≈ y → f (x) ≈ f (y)]

↓ (∀π, π′ ∈ P([0, 1]))(π, π′ ≈ 0 → Sπ(f ) ≈ Sπ′(f ))

  • ,

we can extract a term s2 such that for f : R → R and modulus g1: (∀k0)(∀x, y ∈ [0, 1])(|x − y| <

1 g(k) → |f (x) − f (y)| < 1 k )

(3) ↓ (∀k′)(∀π, π′ ∈ P([0, 1]))

  • π, π′ <

1 s(g,k′) → |Sπ(f ) − Sπ′(f )| ≤ 1 k′

slide-57
SLIDE 57

Introduction: NSA 101 Mining NSA Additional results

The unreasonable effectiveness of NSA

Example II: Continuity implies Riemann integration

From a proof that nonstandard uniformly continuity implies nonstandard Riemann integration in P, i.e.

(∀f : R → R)

  • (∀x, y ∈ [0, 1])[x ≈ y → f (x) ≈ f (y)]

↓ (∀π, π′ ∈ P([0, 1]))(π, π′ ≈ 0 → Sπ(f ) ≈ Sπ′(f ))

  • ,

we can extract a term s2 such that for f : R → R and modulus g1: (∀k0)(∀x, y ∈ [0, 1])(|x − y| <

1 g(k) → |f (x) − f (y)| < 1 k )

(3) ↓ (∀k′)(∀π, π′ ∈ P([0, 1]))

  • π, π′ <

1 s(g,k′) → |Sπ(f ) − Sπ′(f )| ≤ 1 k′

  • is provable in E-PAω.
slide-58
SLIDE 58

Introduction: NSA 101 Mining NSA Additional results

The unreasonable effectiveness of NSA

Example II: Continuity implies Riemann integration

From a proof that nonstandard uniformly continuity implies nonstandard Riemann integration in P, i.e.

(∀f : R → R)

  • (∀x, y ∈ [0, 1])[x ≈ y → f (x) ≈ f (y)]

↓ (∀π, π′ ∈ P([0, 1]))(π, π′ ≈ 0 → Sπ(f ) ≈ Sπ′(f ))

  • ,

we can extract a term s2 such that for f : R → R and modulus g1: (∀k0)(∀x, y ∈ [0, 1])(|x − y| <

1 g(k) → |f (x) − f (y)| < 1 k )

(3) ↓ (∀k′)(∀π, π′ ∈ P([0, 1]))

  • π, π′ <

1 s(g,k′) → |Sπ(f ) − Sπ′(f )| ≤ 1 k′

  • is provable in E-PAω. (and the same for E-HAω)
slide-59
SLIDE 59

Introduction: NSA 101 Mining NSA Additional results

The unreasonable effectiveness of NSA

Example II: Continuity implies Riemann integration

From a proof that nonstandard uniformly continuity implies nonstandard Riemann integration in P, i.e.

(∀f : R → R)

  • (∀x, y ∈ [0, 1])[x ≈ y → f (x) ≈ f (y)]

↓ (∀π, π′ ∈ P([0, 1]))(π, π′ ≈ 0 → Sπ(f ) ≈ Sπ′(f ))

  • ,

we can extract a term s2 such that for f : R → R and modulus g1: (∀k0)(∀x, y ∈ [0, 1])(|x − y| <

1 g(k) → |f (x) − f (y)| < 1 k )

(3) ↓ (∀k′)(∀π, π′ ∈ P([0, 1]))

  • π, π′ <

1 s(g,k′) → |Sπ(f ) − Sπ′(f )| ≤ 1 k′

  • is provable in E-PAω. (and the same for E-HAω)

But (3) is the theorem expressing continuity implies Riemann integration from constructive analysis and computable math.

slide-60
SLIDE 60

Introduction: NSA 101 Mining NSA Additional results

Explicit Reverse Mathematics

Example III: The monotone convergence theorem

slide-61
SLIDE 61

Introduction: NSA 101 Mining NSA Additional results

Explicit Reverse Mathematics

Example III: The monotone convergence theorem From a proof in P of the following equivalence: (∀stf 1)

  • (∃n)f (n) = 0 → (∃stm)f (m) = 0]

(Π0

1-TRANS)

↔ Every standard monotone sequence in [0, 1] nonstandard converges

slide-62
SLIDE 62

Introduction: NSA 101 Mining NSA Additional results

Explicit Reverse Mathematics

Example III: The monotone convergence theorem From a proof in P of the following equivalence: (∀stf 1)

  • (∃n)f (n) = 0 → (∃stm)f (m) = 0]

(Π0

1-TRANS)

↔ Every standard monotone sequence in [0, 1] nonstandard converges two terms u, v can be extracted such that E-PAω proves

slide-63
SLIDE 63

Introduction: NSA 101 Mining NSA Additional results

Explicit Reverse Mathematics

Example III: The monotone convergence theorem From a proof in P of the following equivalence: (∀stf 1)

  • (∃n)f (n) = 0 → (∃stm)f (m) = 0]

(Π0

1-TRANS)

↔ Every standard monotone sequence in [0, 1] nonstandard converges two terms u, v can be extracted such that E-PAω proves If Ξ2 is the Turing jump functional, then u(Ξ) computes the rate

  • f convergence of any monotone sequence in [0, 1].
slide-64
SLIDE 64

Introduction: NSA 101 Mining NSA Additional results

Explicit Reverse Mathematics

Example III: The monotone convergence theorem From a proof in P of the following equivalence: (∀stf 1)

  • (∃n)f (n) = 0 → (∃stm)f (m) = 0]

(Π0

1-TRANS)

↔ Every standard monotone sequence in [0, 1] nonstandard converges two terms u, v can be extracted such that E-PAω proves If Ξ2 is the Turing jump functional, then u(Ξ) computes the rate

  • f convergence of any monotone sequence in [0, 1].

If Ψ1→1 computes the rate of convergence of any monotone sequence in [0, 1], then v(Ψ) is the Turing jump functional.

slide-65
SLIDE 65

Introduction: NSA 101 Mining NSA Additional results

Explicit Reverse Mathematics

Example III: The monotone convergence theorem From a proof in P of the following equivalence: (∀stf 1)

  • (∃n)f (n) = 0 → (∃stm)f (m) = 0]

(Π0

1-TRANS)

↔ Every standard monotone sequence in [0, 1] nonstandard converges two terms u, v can be extracted such that E-PAω proves If Ξ2 is the Turing jump functional, then u(Ξ) computes the rate

  • f convergence of any monotone sequence in [0, 1].

If Ψ1→1 computes the rate of convergence of any monotone sequence in [0, 1], then v(Ψ) is the Turing jump functional. The above is the EXPLICIT equivalence ACA0 ↔ MCT.

slide-66
SLIDE 66

Introduction: NSA 101 Mining NSA Additional results

Explicit Reverse Mathematics

Example III: The monotone convergence theorem From a proof in P of the following equivalence: (∀stf 1)

  • (∃n)f (n) = 0 → (∃stm)f (m) = 0]

(Π0

1-TRANS)

↔ Every standard monotone sequence in [0, 1] nonstandard converges two terms u, v can be extracted such that E-PAω proves If Ξ2 is the Turing jump functional, then u(Ξ) computes the rate

  • f convergence of any monotone sequence in [0, 1].

If Ψ1→1 computes the rate of convergence of any monotone sequence in [0, 1], then v(Ψ) is the Turing jump functional. The above is the EXPLICIT equivalence ACA0 ↔ MCT. (and H?)

slide-67
SLIDE 67

Introduction: NSA 101 Mining NSA Additional results

Explicit Reverse Mathematics

Example IV: Group Theory

slide-68
SLIDE 68

Introduction: NSA 101 Mining NSA Additional results

Explicit Reverse Mathematics

Example IV: Group Theory From a proof in P of the following equivalence: (∀stf 1)

  • (∃g1)(∀n)f (gn) = 0 → (∃stg1)(∀stm)f (gm) = 0]

(Π1

1-TRANS)

↔ Every standard countable abelian group is a direct sum

  • f a standard divisible group and a standard reduced group
slide-69
SLIDE 69

Introduction: NSA 101 Mining NSA Additional results

Explicit Reverse Mathematics

Example IV: Group Theory From a proof in P of the following equivalence: (∀stf 1)

  • (∃g1)(∀n)f (gn) = 0 → (∃stg1)(∀stm)f (gm) = 0]

(Π1

1-TRANS)

↔ Every standard countable abelian group is a direct sum

  • f a standard divisible group and a standard reduced group

two terms u, v can be extracted such that E-PAω proves

slide-70
SLIDE 70

Introduction: NSA 101 Mining NSA Additional results

Explicit Reverse Mathematics

Example IV: Group Theory From a proof in P of the following equivalence: (∀stf 1)

  • (∃g1)(∀n)f (gn) = 0 → (∃stg1)(∀stm)f (gm) = 0]

(Π1

1-TRANS)

↔ Every standard countable abelian group is a direct sum

  • f a standard divisible group and a standard reduced group

two terms u, v can be extracted such that E-PAω proves If Ξ2 is the Suslin functional, then u(Ξ) computes the divisible and reduced group for countable abelian groups.

slide-71
SLIDE 71

Introduction: NSA 101 Mining NSA Additional results

Explicit Reverse Mathematics

Example IV: Group Theory From a proof in P of the following equivalence: (∀stf 1)

  • (∃g1)(∀n)f (gn) = 0 → (∃stg1)(∀stm)f (gm) = 0]

(Π1

1-TRANS)

↔ Every standard countable abelian group is a direct sum

  • f a standard divisible group and a standard reduced group

two terms u, v can be extracted such that E-PAω proves If Ξ2 is the Suslin functional, then u(Ξ) computes the divisible and reduced group for countable abelian groups. If Ψ1→1 computes computes the divisible and reduced group for countable abelian groups, then v(Ψ) is the Suslin functional.

slide-72
SLIDE 72

Introduction: NSA 101 Mining NSA Additional results

Explicit Reverse Mathematics

Example IV: Group Theory From a proof in P of the following equivalence: (∀stf 1)

  • (∃g1)(∀n)f (gn) = 0 → (∃stg1)(∀stm)f (gm) = 0]

(Π1

1-TRANS)

↔ Every standard countable abelian group is a direct sum

  • f a standard divisible group and a standard reduced group

two terms u, v can be extracted such that E-PAω proves If Ξ2 is the Suslin functional, then u(Ξ) computes the divisible and reduced group for countable abelian groups. If Ψ1→1 computes computes the divisible and reduced group for countable abelian groups, then v(Ψ) is the Suslin functional. The above is the EXPLICIT equivalence Π1

1-CA0 ↔ DIV.

slide-73
SLIDE 73

Introduction: NSA 101 Mining NSA Additional results

The unreasonable effectiveness of NSA

Example V: Compactness

slide-74
SLIDE 74

Introduction: NSA 101 Mining NSA Additional results

The unreasonable effectiveness of NSA

Example V: Compactness X is nonstandard compact IFF (∀x ∈ X)(∃sty ∈ X)(x ≈ y).

slide-75
SLIDE 75

Introduction: NSA 101 Mining NSA Additional results

The unreasonable effectiveness of NSA

Example V: Compactness X is nonstandard compact IFF (∀x ∈ X)(∃sty ∈ X)(x ≈ y). From a proof in P of the following equivalence: [0, 1] is nonstandard compact (STP) ↔ Every ns-cont. function is ns-Riemann integrable on [0, 1]

slide-76
SLIDE 76

Introduction: NSA 101 Mining NSA Additional results

The unreasonable effectiveness of NSA

Example V: Compactness X is nonstandard compact IFF (∀x ∈ X)(∃sty ∈ X)(x ≈ y). From a proof in P of the following equivalence: [0, 1] is nonstandard compact (STP) ↔ Every ns-cont. function is ns-Riemann integrable on [0, 1] two terms u, v can be extracted such that E-PAω proves

slide-77
SLIDE 77

Introduction: NSA 101 Mining NSA Additional results

The unreasonable effectiveness of NSA

Example V: Compactness X is nonstandard compact IFF (∀x ∈ X)(∃sty ∈ X)(x ≈ y). From a proof in P of the following equivalence: [0, 1] is nonstandard compact (STP) ↔ Every ns-cont. function is ns-Riemann integrable on [0, 1] two terms u, v can be extracted such that E-PAω proves If Ω3 is the fan functional, then u(Ω) computes the Riemann integral for any cont. function on [0, 1].

slide-78
SLIDE 78

Introduction: NSA 101 Mining NSA Additional results

The unreasonable effectiveness of NSA

Example V: Compactness X is nonstandard compact IFF (∀x ∈ X)(∃sty ∈ X)(x ≈ y). From a proof in P of the following equivalence: [0, 1] is nonstandard compact (STP) ↔ Every ns-cont. function is ns-Riemann integrable on [0, 1] two terms u, v can be extracted such that E-PAω proves If Ω3 is the fan functional, then u(Ω) computes the Riemann integral for any cont. function on [0, 1]. If Ψ(1→1)→1 computes the Riemann integral for any. cont function

  • n [0, 1], then v(Ψ) is the fan functional.
slide-79
SLIDE 79

Introduction: NSA 101 Mining NSA Additional results

The unreasonable effectiveness of NSA

Example V: Compactness X is nonstandard compact IFF (∀x ∈ X)(∃sty ∈ X)(x ≈ y). From a proof in P of the following equivalence: [0, 1] is nonstandard compact (STP) ↔ Every ns-cont. function is ns-Riemann integrable on [0, 1] two terms u, v can be extracted such that E-PAω proves If Ω3 is the fan functional, then u(Ω) computes the Riemann integral for any cont. function on [0, 1]. If Ψ(1→1)→1 computes the Riemann integral for any. cont function

  • n [0, 1], then v(Ψ) is the fan functional.

= the EXPLICIT version of FAN ↔ (cont → Rieman int. on [0, 1]).

slide-80
SLIDE 80

Introduction: NSA 101 Mining NSA Additional results

The unreasonable effectiveness of NSA

Example VI: Compactness bis Compactness has multiple non-equivalent normal forms.

slide-81
SLIDE 81

Introduction: NSA 101 Mining NSA Additional results

The unreasonable effectiveness of NSA

Example VI: Compactness bis Compactness has multiple non-equivalent normal forms. In Example V, the normal form of ns-compactness was a nonstandard version of FAN.

slide-82
SLIDE 82

Introduction: NSA 101 Mining NSA Additional results

The unreasonable effectiveness of NSA

Example VI: Compactness bis Compactness has multiple non-equivalent normal forms. In Example V, the normal form of ns-compactness was a nonstandard version of FAN. Here, the normal form expresses ‘the space can be discretely divided into infinitesimal pieces’.

slide-83
SLIDE 83

Introduction: NSA 101 Mining NSA Additional results

The unreasonable effectiveness of NSA

Example VI: Compactness bis Compactness has multiple non-equivalent normal forms. In Example V, the normal form of ns-compactness was a nonstandard version of FAN. Here, the normal form expresses ‘the space can be discretely divided into infinitesimal pieces’. From a proof in P of the following theorem

For a uniformly ns-cont. f and ns-compact X, f (X) is also ns-compact.

slide-84
SLIDE 84

Introduction: NSA 101 Mining NSA Additional results

The unreasonable effectiveness of NSA

Example VI: Compactness bis Compactness has multiple non-equivalent normal forms. In Example V, the normal form of ns-compactness was a nonstandard version of FAN. Here, the normal form expresses ‘the space can be discretely divided into infinitesimal pieces’. From a proof in P of the following theorem

For a uniformly ns-cont. f and ns-compact X, f (X) is also ns-compact.

slide-85
SLIDE 85

Introduction: NSA 101 Mining NSA Additional results

The unreasonable effectiveness of NSA

Example VI: Compactness bis Compactness has multiple non-equivalent normal forms. In Example V, the normal form of ns-compactness was a nonstandard version of FAN. Here, the normal form expresses ‘the space can be discretely divided into infinitesimal pieces’. From a proof in P of the following theorem

For a uniformly ns-cont. f and ns-compact X, f (X) is also ns-compact.

a term u can be extracted such that E-PAω proves

If Ψ witnesses that X is totally bounded and g is a modulus of uniform

  • cont. for f , then u(Ψ, g) witnesses that f (X) is totally bounded.
slide-86
SLIDE 86

Introduction: NSA 101 Mining NSA Additional results

The unreasonable effectiveness of NSA

Example VI: Compactness bis Compactness has multiple non-equivalent normal forms. In Example V, the normal form of ns-compactness was a nonstandard version of FAN. Here, the normal form expresses ‘the space can be discretely divided into infinitesimal pieces’. From a proof in P of the following theorem

For a uniformly ns-cont. f and ns-compact X, f (X) is also ns-compact.

a term u can be extracted such that E-PAω proves

If Ψ witnesses that X is totally bounded and g is a modulus of uniform

  • cont. for f , then u(Ψ, g) witnesses that f (X) is totally bounded.

. . . which is a theorem from constructive analysis and comp. math.

slide-87
SLIDE 87

Introduction: NSA 101 Mining NSA Additional results

Conclusion

Nonstandard Analysis is unreasonably effective as follows:

slide-88
SLIDE 88

Introduction: NSA 101 Mining NSA Additional results

Conclusion

Nonstandard Analysis is unreasonably effective as follows: a) One should focus on theorems of pure NSA, i.e. involving the nonstandard definitions of continuity, differentiation, Riemann integration, compactness, open sets, et cetera.

slide-89
SLIDE 89

Introduction: NSA 101 Mining NSA Additional results

Conclusion

Nonstandard Analysis is unreasonably effective as follows: a) One should focus on theorems of pure NSA, i.e. involving the nonstandard definitions of continuity, differentiation, Riemann integration, compactness, open sets, et cetera. b) One must work in a system P which has TERM EXTRACTION.

slide-90
SLIDE 90

Introduction: NSA 101 Mining NSA Additional results

Conclusion

Nonstandard Analysis is unreasonably effective as follows: a) One should focus on theorems of pure NSA, i.e. involving the nonstandard definitions of continuity, differentiation, Riemann integration, compactness, open sets, et cetera. b) One must work in a system P which has TERM EXTRACTION.

In particular:

slide-91
SLIDE 91

Introduction: NSA 101 Mining NSA Additional results

Conclusion

Nonstandard Analysis is unreasonably effective as follows: a) One should focus on theorems of pure NSA, i.e. involving the nonstandard definitions of continuity, differentiation, Riemann integration, compactness, open sets, et cetera. b) One must work in a system P which has TERM EXTRACTION.

In particular: a) Observation: Every theorem of pure NSA can be brought into the normal form (∀stx)(∃sty)ϕ(x, y) (ϕ internal).

slide-92
SLIDE 92

Introduction: NSA 101 Mining NSA Additional results

Conclusion

Nonstandard Analysis is unreasonably effective as follows: a) One should focus on theorems of pure NSA, i.e. involving the nonstandard definitions of continuity, differentiation, Riemann integration, compactness, open sets, et cetera. b) One must work in a system P which has TERM EXTRACTION.

In particular: a) Observation: Every theorem of pure NSA can be brought into the normal form (∀stx)(∃sty)ϕ(x, y) (ϕ internal). b) P has the TERM EXTRACTION property for normal forms:

slide-93
SLIDE 93

Introduction: NSA 101 Mining NSA Additional results

Conclusion

Nonstandard Analysis is unreasonably effective as follows: a) One should focus on theorems of pure NSA, i.e. involving the nonstandard definitions of continuity, differentiation, Riemann integration, compactness, open sets, et cetera. b) One must work in a system P which has TERM EXTRACTION.

In particular: a) Observation: Every theorem of pure NSA can be brought into the normal form (∀stx)(∃sty)ϕ(x, y) (ϕ internal). b) P has the TERM EXTRACTION property for normal forms: If P proves (∀stx)(∃sty)ϕ(x, y), then from the latter proof, a term t can be extracted such that E-PAω proves (∀x)(∃y ∈ t(x))ϕ(x, y)

slide-94
SLIDE 94

Introduction: NSA 101 Mining NSA Additional results

Conclusion

Nonstandard Analysis is unreasonably effective as follows: a) One should focus on theorems of pure NSA, i.e. involving the nonstandard definitions of continuity, differentiation, Riemann integration, compactness, open sets, et cetera. b) One must work in a system P which has TERM EXTRACTION.

In particular: a) Observation: Every theorem of pure NSA can be brought into the normal form (∀stx)(∃sty)ϕ(x, y) (ϕ internal). b) P has the TERM EXTRACTION property for normal forms: If P proves (∀stx)(∃sty)ϕ(x, y), then from the latter proof, a term t can be extracted such that E-PAω proves (∀x)(∃y ∈ t(x))ϕ(x, y) (a number of systems have the term extraction property)

slide-95
SLIDE 95

Introduction: NSA 101 Mining NSA Additional results

Towards meta-equivalence: Hebrandisations

slide-96
SLIDE 96

Introduction: NSA 101 Mining NSA Additional results

Towards meta-equivalence: Hebrandisations

From a proof that nonstandard uniformly continuity implies nonstandard Riemann integration in P, i.e.

slide-97
SLIDE 97

Introduction: NSA 101 Mining NSA Additional results

Towards meta-equivalence: Hebrandisations

From a proof that nonstandard uniformly continuity implies nonstandard Riemann integration in P, i.e. (∀f : R → R)

  • (∀x, y ∈ [0, 1])[x ≈ y → f (x) ≈ f (y)]

↓ (4) (∀π, π′ ∈ P([0, 1]))(π, π′ ≈ 0 → Sπ(f ) ≈ Sπ′(f ))

  • ,
slide-98
SLIDE 98

Introduction: NSA 101 Mining NSA Additional results

Towards meta-equivalence: Hebrandisations

From a proof that nonstandard uniformly continuity implies nonstandard Riemann integration in P, i.e. (∀f : R → R)

  • (∀x, y ∈ [0, 1])[x ≈ y → f (x) ≈ f (y)]

↓ (4) (∀π, π′ ∈ P([0, 1]))(π, π′ ≈ 0 → Sπ(f ) ≈ Sπ′(f ))

  • ,

we can extract terms i, o such that for all f , g : R → R, and ε′ > 0: (∀x, y ∈ [0, 1], ε > i(g, ε′))(|x − y| < g(ε) → |f (x) − f (y)| < ε) ↓ (5) (∀π, π′ ∈ P([0, 1]))

  • π, π′ < o(g, ε′) → |Sπ(f ) − Sπ′(f )| ≤ ε′
slide-99
SLIDE 99

Introduction: NSA 101 Mining NSA Additional results

Towards meta-equivalence: Hebrandisations

From a proof that nonstandard uniformly continuity implies nonstandard Riemann integration in P, i.e. (∀f : R → R)

  • (∀x, y ∈ [0, 1])[x ≈ y → f (x) ≈ f (y)]

↓ (4) (∀π, π′ ∈ P([0, 1]))(π, π′ ≈ 0 → Sπ(f ) ≈ Sπ′(f ))

  • ,

we can extract terms i, o such that for all f , g : R → R, and ε′ > 0: (∀x, y ∈ [0, 1], ε > i(g, ε′))(|x − y| < g(ε) → |f (x) − f (y)| < ε) ↓ (5) (∀π, π′ ∈ P([0, 1]))

  • π, π′ < o(g, ε′) → |Sπ(f ) − Sπ′(f )| ≤ ε′

is provable in E-PAω,

slide-100
SLIDE 100

Introduction: NSA 101 Mining NSA Additional results

Towards meta-equivalence: Hebrandisations

From a proof that nonstandard uniformly continuity implies nonstandard Riemann integration in P, i.e. (∀f : R → R)

  • (∀x, y ∈ [0, 1])[x ≈ y → f (x) ≈ f (y)]

↓ (4) (∀π, π′ ∈ P([0, 1]))(π, π′ ≈ 0 → Sπ(f ) ≈ Sπ′(f ))

  • ,

we can extract terms i, o such that for all f , g : R → R, and ε′ > 0: (∀x, y ∈ [0, 1], ε > i(g, ε′))(|x − y| < g(ε) → |f (x) − f (y)| < ε) ↓ (5) (∀π, π′ ∈ P([0, 1]))

  • π, π′ < o(g, ε′) → |Sπ(f ) − Sπ′(f )| ≤ ε′

is provable in E-PAω, AND VICE VERSA: if E-PAω ⊢ (5), then P ⊢ (4)

slide-101
SLIDE 101

Introduction: NSA 101 Mining NSA Additional results

Towards meta-equivalence: Hebrandisations

From a proof that nonstandard uniformly continuity implies nonstandard Riemann integration in P, i.e. (∀f : R → R)

  • (∀x, y ∈ [0, 1])[x ≈ y → f (x) ≈ f (y)]

↓ (4) (∀π, π′ ∈ P([0, 1]))(π, π′ ≈ 0 → Sπ(f ) ≈ Sπ′(f ))

  • ,

we can extract terms i, o such that for all f , g : R → R, and ε′ > 0: (∀x, y ∈ [0, 1], ε > i(g, ε′))(|x − y| < g(ε) → |f (x) − f (y)| < ε) ↓ (5) (∀π, π′ ∈ P([0, 1]))

  • π, π′ < o(g, ε′) → |Sπ(f ) − Sπ′(f )| ≤ ε′

is provable in E-PAω, AND VICE VERSA: if E-PAω ⊢ (5), then P ⊢ (4) (5) is a theorem from numerical analysis, and is called the HERBRANDISATION of (4).

slide-102
SLIDE 102

Introduction: NSA 101 Mining NSA Additional results

Towards meta-equivalence: Hebrandisations

From a proof that nonstandard uniformly continuity implies nonstandard Riemann integration in P, i.e. (∀f : R → R)

  • (∀x, y ∈ [0, 1])[x ≈ y → f (x) ≈ f (y)]

↓ (4) (∀π, π′ ∈ P([0, 1]))(π, π′ ≈ 0 → Sπ(f ) ≈ Sπ′(f ))

  • ,

we can extract terms i, o such that for all f , g : R → R, and ε′ > 0: (∀x, y ∈ [0, 1], ε > i(g, ε′))(|x − y| < g(ε) → |f (x) − f (y)| < ε) ↓ (5) (∀π, π′ ∈ P([0, 1]))

  • π, π′ < o(g, ε′) → |Sπ(f ) − Sπ′(f )| ≤ ε′

is provable in E-PAω, AND VICE VERSA: if E-PAω ⊢ (5), then P ⊢ (4) (5) is a theorem from numerical analysis, and is called the HERBRANDISATION of (4).

slide-103
SLIDE 103

Introduction: NSA 101 Mining NSA Additional results

An Hebrandisation in Reverse Mathematics

Every theorem of pure NSA has such a ‘meta-equivalent’ Hebrandisation.

slide-104
SLIDE 104

Introduction: NSA 101 Mining NSA Additional results

An Hebrandisation in Reverse Mathematics

Every theorem of pure NSA has such a ‘meta-equivalent’ Hebrandisation.

From a proof in P of the following implication: (∀stf 1)

  • (∃n)f (n) = 0 → (∃stm)f (m) = 0]

(Π0

1-TRANS)

↓ (6) Every standard monotone sequence in [0, 1] nonstandard converges

slide-105
SLIDE 105

Introduction: NSA 101 Mining NSA Additional results

An Hebrandisation in Reverse Mathematics

Every theorem of pure NSA has such a ‘meta-equivalent’ Hebrandisation.

From a proof in P of the following implication: (∀stf 1)

  • (∃n)f (n) = 0 → (∃stm)f (m) = 0]

(Π0

1-TRANS)

↓ (6) Every standard monotone sequence in [0, 1] nonstandard converges two terms i, o can be extracted such that E-PAω proves the following Herbrandisation of (6):

slide-106
SLIDE 106

Introduction: NSA 101 Mining NSA Additional results

An Hebrandisation in Reverse Mathematics

Every theorem of pure NSA has such a ‘meta-equivalent’ Hebrandisation.

From a proof in P of the following implication: (∀stf 1)

  • (∃n)f (n) = 0 → (∃stm)f (m) = 0]

(Π0

1-TRANS)

↓ (6) Every standard monotone sequence in [0, 1] nonstandard converges two terms i, o can be extracted such that E-PAω proves the following Herbrandisation of (6): For every sequence x1

(·) and every Ξ2, if Ξ is the Turing jump

functional for all sequences in i(Ξ, x(·)), then o(Ξ, x(·)) computes the rate of convergence of the monotone sequence x(·) in [0, 1].

slide-107
SLIDE 107

Introduction: NSA 101 Mining NSA Additional results

An Hebrandisation in Reverse Mathematics

Every theorem of pure NSA has such a ‘meta-equivalent’ Hebrandisation.

From a proof in P of the following implication: (∀stf 1)

  • (∃n)f (n) = 0 → (∃stm)f (m) = 0]

(Π0

1-TRANS)

↓ (6) Every standard monotone sequence in [0, 1] nonstandard converges two terms i, o can be extracted such that E-PAω proves the following Herbrandisation of (6): For every sequence x1

(·) and every Ξ2, if Ξ is the Turing jump

functional for all sequences in i(Ξ, x(·)), then o(Ξ, x(·)) computes the rate of convergence of the monotone sequence x(·) in [0, 1]. The Hebrandisation of (6) is the ‘pointwise’ version of the explicit implication ACA0 → MCT.

slide-108
SLIDE 108

Introduction: NSA 101 Mining NSA Additional results

Mining standard proofs

Question: Can you also mine proofs not involving NSA?

slide-109
SLIDE 109

Introduction: NSA 101 Mining NSA Additional results

Mining standard proofs

Question: Can you also mine proofs not involving NSA? Answer: Yes, but. . . !

slide-110
SLIDE 110

Introduction: NSA 101 Mining NSA Additional results

Mining standard proofs

Question: Can you also mine proofs not involving NSA? Answer: Yes, but. . . ! The Ferreira-Gaspar system M (APAL2015) is similar to P but based on strong majorizability (Bezem-Howard).

slide-111
SLIDE 111

Introduction: NSA 101 Mining NSA Additional results

Mining standard proofs

Question: Can you also mine proofs not involving NSA? Answer: Yes, but. . . ! The Ferreira-Gaspar system M (APAL2015) is similar to P but based on strong majorizability (Bezem-Howard). System M satisfies Kohlenbach’s non-classical uniform boundedness principles.

slide-112
SLIDE 112

Introduction: NSA 101 Mining NSA Additional results

Mining standard proofs

Question: Can you also mine proofs not involving NSA? Answer: Yes, but. . . ! The Ferreira-Gaspar system M (APAL2015) is similar to P but based on strong majorizability (Bezem-Howard). System M satisfies Kohlenbach’s non-classical uniform boundedness principles. As a consequence, M believes ‘ε-δ’ and nonstandard definitions are equivalent.

slide-113
SLIDE 113

Introduction: NSA 101 Mining NSA Additional results

Mining standard proofs

Question: Can you also mine proofs not involving NSA? Answer: Yes, but. . . ! The Ferreira-Gaspar system M (APAL2015) is similar to P but based on strong majorizability (Bezem-Howard). System M satisfies Kohlenbach’s non-classical uniform boundedness principles. As a consequence, M believes ‘ε-δ’ and nonstandard definitions are equivalent. Thus, one can ‘indirectly’ mine proofs from E-PAω + WKL not involving NSA inside M.

slide-114
SLIDE 114

Introduction: NSA 101 Mining NSA Additional results

Mining standard proofs

Question: Can you also mine proofs not involving NSA? Answer: Yes, but. . . ! The Ferreira-Gaspar system M (APAL2015) is similar to P but based on strong majorizability (Bezem-Howard). System M satisfies Kohlenbach’s non-classical uniform boundedness principles. As a consequence, M believes ‘ε-δ’ and nonstandard definitions are equivalent. Thus, one can ‘indirectly’ mine proofs from E-PAω + WKL not involving NSA inside M. Warning: Term extraction using M often produces vacuous truths (always for theorems requiring arithmetical comprehesion).

slide-115
SLIDE 115

Introduction: NSA 101 Mining NSA Additional results

Impredicative, predicative and . . . locally constructive

slide-116
SLIDE 116

Introduction: NSA 101 Mining NSA Additional results

Impredicative, predicative and . . . locally constructive

The Suslin functional (S2) is the functional version of Π1

1-CA0:

(∃S2)(∀f 1)

  • S(f ) = 0 ↔ (∃g1)(∀n0)(f (gn) = 0)
  • .

(S2)

slide-117
SLIDE 117

Introduction: NSA 101 Mining NSA Additional results

Impredicative, predicative and . . . locally constructive

The Suslin functional (S2) is the functional version of Π1

1-CA0:

(∃S2)(∀f 1)

  • S(f ) = 0 ↔ (∃g1)(∀n0)(f (gn) = 0)
  • .

(S2) The system P + (S2) is impredicative, but its term extraction produces predicative results (terms from G¨

  • del’s T):
slide-118
SLIDE 118

Introduction: NSA 101 Mining NSA Additional results

Impredicative, predicative and . . . locally constructive

The Suslin functional (S2) is the functional version of Π1

1-CA0:

(∃S2)(∀f 1)

  • S(f ) = 0 ↔ (∃g1)(∀n0)(f (gn) = 0)
  • .

(S2) The system P + (S2) is impredicative, but its term extraction produces predicative results (terms from G¨

  • del’s T):

If P + (S2) proves (∀stx)(∃sty)ϕ(x, y), then a term t from G¨

  • del’s T can

be extracted such that E-PAω + (S2) proves (∀x)(∃y ∈ t(x))ϕ(x, y)

slide-119
SLIDE 119

Introduction: NSA 101 Mining NSA Additional results

Impredicative, predicative and . . . locally constructive

The Suslin functional (S2) is the functional version of Π1

1-CA0:

(∃S2)(∀f 1)

  • S(f ) = 0 ↔ (∃g1)(∀n0)(f (gn) = 0)
  • .

(S2) The system P + (S2) is impredicative, but its term extraction produces predicative results (terms from G¨

  • del’s T):

If P + (S2) proves (∀stx)(∃sty)ϕ(x, y), then a term t from G¨

  • del’s T can

be extracted such that E-PAω + (S2) proves (∀x)(∃y ∈ t(x))ϕ(x, y)

HOWEVER:

If P + (S2)st proves (∀stx)(∃sty)ϕ(x, y), then a term t from G¨

  • del’s T can

be extracted such that E-PAω + (S2) proves (∀x)(∃y ∈ t(x, S))ϕ(x, y)

slide-120
SLIDE 120

Introduction: NSA 101 Mining NSA Additional results

Impredicative, predicative and . . . locally constructive

The Suslin functional (S2) is the functional version of Π1

1-CA0:

(∃S2)(∀f 1)

  • S(f ) = 0 ↔ (∃g1)(∀n0)(f (gn) = 0)
  • .

(S2) The system P + (S2) is impredicative, but its term extraction produces predicative results (terms from G¨

  • del’s T):

If P + (S2) proves (∀stx)(∃sty)ϕ(x, y), then a term t from G¨

  • del’s T can

be extracted such that E-PAω + (S2) proves (∀x)(∃y ∈ t(x))ϕ(x, y)

HOWEVER:

If P + (S2)st proves (∀stx)(∃sty)ϕ(x, y), then a term t from G¨

  • del’s T can

be extracted such that E-PAω + (S2) proves (∀x)(∃y ∈ t(x, S))ϕ(x, y)

Standard objects in P and H are those which are computationally relevant

slide-121
SLIDE 121

Introduction: NSA 101 Mining NSA Additional results

Impredicative, predicative and . . . locally constructive

The Suslin functional (S2) is the functional version of Π1

1-CA0:

(∃S2)(∀f 1)

  • S(f ) = 0 ↔ (∃g1)(∀n0)(f (gn) = 0)
  • .

(S2) The system P + (S2) is impredicative, but its term extraction produces predicative results (terms from G¨

  • del’s T):

If P + (S2) proves (∀stx)(∃sty)ϕ(x, y), then a term t from G¨

  • del’s T can

be extracted such that E-PAω + (S2) proves (∀x)(∃y ∈ t(x))ϕ(x, y)

HOWEVER:

If P + (S2)st proves (∀stx)(∃sty)ϕ(x, y), then a term t from G¨

  • del’s T can

be extracted such that E-PAω + (S2) proves (∀x)(∃y ∈ t(x, S))ϕ(x, y)

Standard objects in P and H are those which are computationally relevant(cf. Berger’s uniform HA and Lifschitz’s calculable numbers)

slide-122
SLIDE 122

Introduction: NSA 101 Mining NSA Additional results

Impredicative, predicative and . . . locally constructive

The Suslin functional (S2) is the functional version of Π1

1-CA0:

(∃S2)(∀f 1)

  • S(f ) = 0 ↔ (∃g1)(∀n0)(f (gn) = 0)
  • .

(S2) The system P + (S2) is impredicative, but its term extraction produces predicative results (terms from G¨

  • del’s T):

If P + (S2) proves (∀stx)(∃sty)ϕ(x, y), then a term t from G¨

  • del’s T can

be extracted such that E-PAω + (S2) proves (∀x)(∃y ∈ t(x))ϕ(x, y)

HOWEVER:

If P + (S2)st proves (∀stx)(∃sty)ϕ(x, y), then a term t from G¨

  • del’s T can

be extracted such that E-PAω + (S2) proves (∀x)(∃y ∈ t(x, S))ϕ(x, y)

Standard objects in P and H are those which are computationally relevant(cf. Berger’s uniform HA and Lifschitz’s calculable numbers) RM: (S2) is equivalent to ‘all sets are located’.

slide-123
SLIDE 123

Introduction: NSA 101 Mining NSA Additional results

Impredicative, predicative and . . . locally constructive

The Suslin functional (S2) is the functional version of Π1

1-CA0:

(∃S2)(∀f 1)

  • S(f ) = 0 ↔ (∃g1)(∀n0)(f (gn) = 0)
  • .

(S2) The system P + (S2) is impredicative, but its term extraction produces predicative results (terms from G¨

  • del’s T):

If P + (S2) proves (∀stx)(∃sty)ϕ(x, y), then a term t from G¨

  • del’s T can

be extracted such that E-PAω + (S2) proves (∀x)(∃y ∈ t(x))ϕ(x, y)

HOWEVER:

If P + (S2)st proves (∀stx)(∃sty)ϕ(x, y), then a term t from G¨

  • del’s T can

be extracted such that E-PAω + (S2) proves (∀x)(∃y ∈ t(x, S))ϕ(x, y)

Standard objects in P and H are those which are computationally relevant(cf. Berger’s uniform HA and Lifschitz’s calculable numbers) RM: (S2) is equivalent to ‘all sets are located’. We can replace locatedness by (S2), while still obtaining computational info!

slide-124
SLIDE 124

Introduction: NSA 101 Mining NSA Additional results

Final Thoughts

slide-125
SLIDE 125

Introduction: NSA 101 Mining NSA Additional results

Final Thoughts

The two eyes of exact science are mathematics and logic, the mathematical sect puts out the logical eye, the logical sect puts out the mathematical eye; each believing that it sees better with one eye than with two.

Augustus De Morgan

slide-126
SLIDE 126

Introduction: NSA 101 Mining NSA Additional results

Final Thoughts

The two eyes of exact science are mathematics and logic, the mathematical sect puts out the logical eye, the logical sect puts out the mathematical eye; each believing that it sees better with one eye than with two.

Augustus De Morgan ‘. . . there are good reasons to believe that nonstandard analysis, in some version or other, will be the analysis of the future.’ Kurt G¨

  • del
slide-127
SLIDE 127

Introduction: NSA 101 Mining NSA Additional results

Final Thoughts

The two eyes of exact science are mathematics and logic, the mathematical sect puts out the logical eye, the logical sect puts out the mathematical eye; each believing that it sees better with one eye than with two.

Augustus De Morgan ‘. . . there are good reasons to believe that nonstandard analysis, in some version or other, will be the analysis of the future.’ Kurt G¨

  • del

We thank the John Templeton Foundation and Alexander Von Humboldt Foundation for their generous support!

slide-128
SLIDE 128

Introduction: NSA 101 Mining NSA Additional results

Final Thoughts

The two eyes of exact science are mathematics and logic, the mathematical sect puts out the logical eye, the logical sect puts out the mathematical eye; each believing that it sees better with one eye than with two.

Augustus De Morgan ‘. . . there are good reasons to believe that nonstandard analysis, in some version or other, will be the analysis of the future.’ Kurt G¨

  • del

We thank the John Templeton Foundation and Alexander Von Humboldt Foundation for their generous support!

Thank you for your attention!

slide-129
SLIDE 129

Introduction: NSA 101 Mining NSA Additional results

Final Thoughts

The two eyes of exact science are mathematics and logic, the mathematical sect puts out the logical eye, the logical sect puts out the mathematical eye; each believing that it sees better with one eye than with two.

Augustus De Morgan ‘. . . there are good reasons to believe that nonstandard analysis, in some version or other, will be the analysis of the future.’ Kurt G¨

  • del

We thank the John Templeton Foundation and Alexander Von Humboldt Foundation for their generous support!

Thank you for your attention!

Any questions?