the unreasonable effectiveness of nonstandard analysis
play

The unreasonable effectiveness of Nonstandard Analysis Sam Sanders - PowerPoint PPT Presentation

The unreasonable effectiveness of Nonstandard Analysis Sam Sanders CCC, Kochel, Sept. 2015 Introduction: NSA 101 Mining NSA Additional results Aim and motivation Aim: To show that proofs of theorems of PURE Nonstandard Analysis can be mined


  1. Introduction: NSA 101 Mining NSA Additional results Introducing Nonstandard Analysis Nelson’s Internal Set Theory is a syntactic approach to Nonstandard Analysis. Add a new predicate st( x ) read ‘ x is standard’ to L ZFC . We write ( ∃ st x ) and ( ∀ st y ) for ( ∃ x )(st( x ) ∧ . . . ) and ( ∀ y )(st( y ) → . . . ).

  2. Introduction: NSA 101 Mining NSA Additional results Introducing Nonstandard Analysis Nelson’s Internal Set Theory is a syntactic approach to Nonstandard Analysis. Add a new predicate st( x ) read ‘ x is standard’ to L ZFC . We write ( ∃ st x ) and ( ∀ st y ) for ( ∃ x )(st( x ) ∧ . . . ) and ( ∀ y )(st( y ) → . . . ). A formula is internal if it does not contain ‘st’; external otherwise

  3. Introduction: NSA 101 Mining NSA Additional results Introducing Nonstandard Analysis Nelson’s Internal Set Theory is a syntactic approach to Nonstandard Analysis. Add a new predicate st( x ) read ‘ x is standard’ to L ZFC . We write ( ∃ st x ) and ( ∀ st y ) for ( ∃ x )(st( x ) ∧ . . . ) and ( ∀ y )(st( y ) → . . . ). A formula is internal if it does not contain ‘st’; external otherwise Internal Set Theory IST is ZFC plus the new axioms:

  4. Introduction: NSA 101 Mining NSA Additional results Introducing Nonstandard Analysis Nelson’s Internal Set Theory is a syntactic approach to Nonstandard Analysis. Add a new predicate st( x ) read ‘ x is standard’ to L ZFC . We write ( ∃ st x ) and ( ∀ st y ) for ( ∃ x )(st( x ) ∧ . . . ) and ( ∀ y )(st( y ) → . . . ). A formula is internal if it does not contain ‘st’; external otherwise Internal Set Theory IST is ZFC plus the new axioms: Transfer: ( ∀ st x ) ϕ ( x , t ) → ( ∀ x ) ϕ ( x , t ) for internal ϕ and standard t .

  5. Introduction: NSA 101 Mining NSA Additional results Introducing Nonstandard Analysis Nelson’s Internal Set Theory is a syntactic approach to Nonstandard Analysis. Add a new predicate st( x ) read ‘ x is standard’ to L ZFC . We write ( ∃ st x ) and ( ∀ st y ) for ( ∃ x )(st( x ) ∧ . . . ) and ( ∀ y )(st( y ) → . . . ). A formula is internal if it does not contain ‘st’; external otherwise Internal Set Theory IST is ZFC plus the new axioms: Transfer: ( ∀ st x ) ϕ ( x , t ) → ( ∀ x ) ϕ ( x , t ) for internal ϕ and standard t . Standard Part: ( ∀ x )( ∃ st y )( ∀ st z )( z ∈ x ↔ z ∈ y ).

  6. Introduction: NSA 101 Mining NSA Additional results Introducing Nonstandard Analysis Nelson’s Internal Set Theory is a syntactic approach to Nonstandard Analysis. Add a new predicate st( x ) read ‘ x is standard’ to L ZFC . We write ( ∃ st x ) and ( ∀ st y ) for ( ∃ x )(st( x ) ∧ . . . ) and ( ∀ y )(st( y ) → . . . ). A formula is internal if it does not contain ‘st’; external otherwise Internal Set Theory IST is ZFC plus the new axioms: Transfer: ( ∀ st x ) ϕ ( x , t ) → ( ∀ x ) ϕ ( x , t ) for internal ϕ and standard t . Standard Part: ( ∀ x )( ∃ st y )( ∀ st z )( z ∈ x ↔ z ∈ y ). Idealization:. . . (push quantifiers ( ∀ st x ) and ( ∃ st y ) to the front)

  7. Introduction: NSA 101 Mining NSA Additional results Introducing Nonstandard Analysis Nelson’s Internal Set Theory is a syntactic approach to Nonstandard Analysis. Add a new predicate st( x ) read ‘ x is standard’ to L ZFC . We write ( ∃ st x ) and ( ∀ st y ) for ( ∃ x )(st( x ) ∧ . . . ) and ( ∀ y )(st( y ) → . . . ). A formula is internal if it does not contain ‘st’; external otherwise Internal Set Theory IST is ZFC plus the new axioms: Transfer: ( ∀ st x ) ϕ ( x , t ) → ( ∀ x ) ϕ ( x , t ) for internal ϕ and standard t . Standard Part: ( ∀ x )( ∃ st y )( ∀ st z )( z ∈ x ↔ z ∈ y ). Idealization:. . . (push quantifiers ( ∀ st x ) and ( ∃ st y ) to the front) Conservation: ZFC and IST prove the same internal sentences.

  8. Introduction: NSA 101 Mining NSA Additional results Introducing Nonstandard Analysis Nelson’s Internal Set Theory is a syntactic approach to Nonstandard Analysis. Add a new predicate st( x ) read ‘ x is standard’ to L ZFC . We write ( ∃ st x ) and ( ∀ st y ) for ( ∃ x )(st( x ) ∧ . . . ) and ( ∀ y )(st( y ) → . . . ). A formula is internal if it does not contain ‘st’; external otherwise Internal Set Theory IST is ZFC plus the new axioms: Transfer: ( ∀ st x ) ϕ ( x , t ) → ( ∀ x ) ϕ ( x , t ) for internal ϕ and standard t . Standard Part: ( ∀ x )( ∃ st y )( ∀ st z )( z ∈ x ↔ z ∈ y ). Idealization:. . . (push quantifiers ( ∀ st x ) and ( ∃ st y ) to the front) Conservation: ZFC and IST prove the same internal sentences. And analogous results for fragments of IST.

  9. Introduction: NSA 101 Mining NSA Additional results A fragment based on G¨ odel’s T van den Berg, Briseid, Safarik, A functional interpretation of nonstandard arithmetic, APAL2012

  10. Introduction: NSA 101 Mining NSA Additional results A fragment based on G¨ odel’s T van den Berg, Briseid, Safarik, A functional interpretation of nonstandard arithmetic, APAL2012 E-PA ω is Peano arithmetic in all finite types with the axiom of extensionality.

  11. Introduction: NSA 101 Mining NSA Additional results A fragment based on G¨ odel’s T van den Berg, Briseid, Safarik, A functional interpretation of nonstandard arithmetic, APAL2012 E-PA ω is Peano arithmetic in all finite types with the axiom of extensionality. I is Nelson’s idealisation axiom in the language of finite types.

  12. Introduction: NSA 101 Mining NSA Additional results A fragment based on G¨ odel’s T van den Berg, Briseid, Safarik, A functional interpretation of nonstandard arithmetic, APAL2012 E-PA ω is Peano arithmetic in all finite types with the axiom of extensionality. I is Nelson’s idealisation axiom in the language of finite types. HAC int is a weak version of Nelson’s Standard Part axiom:

  13. Introduction: NSA 101 Mining NSA Additional results A fragment based on G¨ odel’s T van den Berg, Briseid, Safarik, A functional interpretation of nonstandard arithmetic, APAL2012 E-PA ω is Peano arithmetic in all finite types with the axiom of extensionality. I is Nelson’s idealisation axiom in the language of finite types. HAC int is a weak version of Nelson’s Standard Part axiom: ( ∀ st x ρ )( ∃ st y τ ) ϕ ( x , y ) → ( ∃ st f ρ → τ ∗ )( ∀ st x ρ )( ∃ y τ ∈ f ( x )) ϕ ( x , y ) Only a finite sequence of witnesses; ϕ is internal.

  14. Introduction: NSA 101 Mining NSA Additional results A fragment based on G¨ odel’s T van den Berg, Briseid, Safarik, A functional interpretation of nonstandard arithmetic, APAL2012 E-PA ω is Peano arithmetic in all finite types with the axiom of extensionality. I is Nelson’s idealisation axiom in the language of finite types. HAC int is a weak version of Nelson’s Standard Part axiom: ( ∀ st x ρ )( ∃ st y τ ) ϕ ( x , y ) → ( ∃ st f ρ → τ ∗ )( ∀ st x ρ )( ∃ y τ ∈ f ( x )) ϕ ( x , y ) Only a finite sequence of witnesses; ϕ is internal. P := E-PA ω + I + HAC int is a conservative extension of E-PA ω .

  15. Introduction: NSA 101 Mining NSA Additional results A fragment based on G¨ odel’s T van den Berg, Briseid, Safarik, A functional interpretation of nonstandard arithmetic, APAL2012 E-PA ω is Peano arithmetic in all finite types with the axiom of extensionality. I is Nelson’s idealisation axiom in the language of finite types. HAC int is a weak version of Nelson’s Standard Part axiom: ( ∀ st x ρ )( ∃ st y τ ) ϕ ( x , y ) → ( ∃ st f ρ → τ ∗ )( ∀ st x ρ )( ∃ y τ ∈ f ( x )) ϕ ( x , y ) Only a finite sequence of witnesses; ϕ is internal. P := E-PA ω + I + HAC int is a conservative extension of E-PA ω . Same for nonstandard version H of E-HA ω and intuitionistic logic.

  16. Introduction: NSA 101 Mining NSA Additional results A new computational aspect of NSA

  17. Introduction: NSA 101 Mining NSA Additional results A new computational aspect of NSA TERM EXTRACTION

  18. Introduction: NSA 101 Mining NSA Additional results A new computational aspect of NSA TERM EXTRACTION van den Berg, Briseid, Safarik, A functional interpretation of nonstandard arithmetic, APAL2012

  19. Introduction: NSA 101 Mining NSA Additional results A new computational aspect of NSA TERM EXTRACTION van den Berg, Briseid, Safarik, A functional interpretation of nonstandard arithmetic, APAL2012 If system P (resp. H) proves ( ∀ st x )( ∃ st y ) ϕ ( x , y ) ( ϕ internal)

  20. Introduction: NSA 101 Mining NSA Additional results A new computational aspect of NSA TERM EXTRACTION van den Berg, Briseid, Safarik, A functional interpretation of nonstandard arithmetic, APAL2012 If system P (resp. H) proves ( ∀ st x )( ∃ st y ) ϕ ( x , y ) ( ϕ internal) then a term t can be extracted from this proof such that E-PA ω (resp. E-HA ω ) proves ( ∀ x )( ∃ y ∈ t ( x )) ϕ ( x , y ).

  21. Introduction: NSA 101 Mining NSA Additional results A new computational aspect of NSA TERM EXTRACTION van den Berg, Briseid, Safarik, A functional interpretation of nonstandard arithmetic, APAL2012 If system P (resp. H) proves ( ∀ st x )( ∃ st y ) ϕ ( x , y ) ( ϕ internal) then a term t can be extracted from this proof such that E-PA ω (resp. E-HA ω ) proves ( ∀ x )( ∃ y ∈ t ( x )) ϕ ( x , y ). OBSERVATION: Nonstandard definitions (of continuity, compactness, Riemann int., etc) can be brought into the ‘normal form’ ( ∀ st x )( ∃ st y ) ϕ ( x , y ).

  22. Introduction: NSA 101 Mining NSA Additional results A new computational aspect of NSA TERM EXTRACTION van den Berg, Briseid, Safarik, A functional interpretation of nonstandard arithmetic, APAL2012 If system P (resp. H) proves ( ∀ st x )( ∃ st y ) ϕ ( x , y ) ( ϕ internal) then a term t can be extracted from this proof such that E-PA ω (resp. E-HA ω ) proves ( ∀ x )( ∃ y ∈ t ( x )) ϕ ( x , y ). OBSERVATION: Nonstandard definitions (of continuity, compactness, Riemann int., etc) can be brought into the ‘normal form’ ( ∀ st x )( ∃ st y ) ϕ ( x , y ). Such normal forms are closed under modes ponens (in both P and H)

  23. Introduction: NSA 101 Mining NSA Additional results A new computational aspect of NSA TERM EXTRACTION van den Berg, Briseid, Safarik, A functional interpretation of nonstandard arithmetic, APAL2012 If system P (resp. H) proves ( ∀ st x )( ∃ st y ) ϕ ( x , y ) ( ϕ internal) then a term t can be extracted from this proof such that E-PA ω (resp. E-HA ω ) proves ( ∀ x )( ∃ y ∈ t ( x )) ϕ ( x , y ). OBSERVATION: Nonstandard definitions (of continuity, compactness, Riemann int., etc) can be brought into the ‘normal form’ ( ∀ st x )( ∃ st y ) ϕ ( x , y ). Such normal forms are closed under modes ponens (in both P and H) All theorems of PURE Nonstandard Analysis can be mined using the term extraction result (of P and H).

  24. Introduction: NSA 101 Mining NSA Additional results The unreasonable effectiveness of NSA Example I: Continuity.

  25. Introduction: NSA 101 Mining NSA Additional results The unreasonable effectiveness of NSA Example I: Continuity. From a proof that f is nonstandard uniformly continuous in P, i.e. ( ∀ x , y ∈ [0 , 1])( x ≈ y → f ( x ) ≈ f ( y )) ,

  26. Introduction: NSA 101 Mining NSA Additional results The unreasonable effectiveness of NSA Example I: Continuity. From a proof that f is nonstandard uniformly continuous in P, i.e. ( ∀ x , y ∈ [0 , 1])( x ≈ y → f ( x ) ≈ f ( y )) , (1) we can extract a term t 1 (from G¨ odel’s T) such that E-PA ω proves ( ∀ k 0 )( ∀ x , y ∈ [0 , 1])( | x − y | < t ( k ) → | f ( x ) − f ( y ) | < 1 1 k ) , (2)

  27. Introduction: NSA 101 Mining NSA Additional results The unreasonable effectiveness of NSA Example I: Continuity. From a proof that f is nonstandard uniformly continuous in P, i.e. ( ∀ x , y ∈ [0 , 1])( x ≈ y → f ( x ) ≈ f ( y )) , (1) we can extract a term t 1 (from G¨ odel’s T) such that E-PA ω proves ( ∀ k 0 )( ∀ x , y ∈ [0 , 1])( | x − y | < t ( k ) → | f ( x ) − f ( y ) | < 1 1 k ) , (2) AND VICE VERSA: E-PA ω ⊢ (2) implies P ⊢ (1).

  28. Introduction: NSA 101 Mining NSA Additional results The unreasonable effectiveness of NSA Example I: Continuity. From a proof that f is nonstandard uniformly continuous in P, i.e. ( ∀ x , y ∈ [0 , 1])( x ≈ y → f ( x ) ≈ f ( y )) , (1) we can extract a term t 1 (from G¨ odel’s T) such that E-PA ω proves ( ∀ k 0 )( ∀ x , y ∈ [0 , 1])( | x − y | < t ( k ) → | f ( x ) − f ( y ) | < 1 1 k ) , (2) AND VICE VERSA: E-PA ω ⊢ (2) implies P ⊢ (1). (2) is the notion of continuity (with a modulus t ) used in constructive analysis and computable math (Bishop, etc).

  29. Introduction: NSA 101 Mining NSA Additional results The unreasonable effectiveness of NSA Example I: Continuity. From a proof that f is nonstandard uniformly continuous in P, i.e. ( ∀ x , y ∈ [0 , 1])( x ≈ y → f ( x ) ≈ f ( y )) , (1) we can extract a term t 1 (from G¨ odel’s T) such that E-PA ω proves ( ∀ k 0 )( ∀ x , y ∈ [0 , 1])( | x − y | < t ( k ) → | f ( x ) − f ( y ) | < 1 1 k ) , (2) AND VICE VERSA: E-PA ω ⊢ (2) implies P ⊢ (1). (2) is the notion of continuity (with a modulus t ) used in constructive analysis and computable math (Bishop, etc). Et pour les constructivists: la mˆ e me chose!

  30. Introduction: NSA 101 Mining NSA Additional results The unreasonable effectiveness of NSA Example II: Continuity implies Riemann integration

  31. Introduction: NSA 101 Mining NSA Additional results The unreasonable effectiveness of NSA Example II: Continuity implies Riemann integration From a proof that nonstandard uniformly continuity implies nonstandard Riemann integration in P, i.e.

  32. Introduction: NSA 101 Mining NSA Additional results The unreasonable effectiveness of NSA Example II: Continuity implies Riemann integration From a proof that nonstandard uniformly continuity implies nonstandard Riemann integration in P, i.e. � ( ∀ f : R → R ) ( ∀ x , y ∈ [0 , 1])[ x ≈ y → f ( x ) ≈ f ( y )] ↓ ( ∀ π, π ′ ∈ P ([0 , 1]))( � π � , � π ′ � ≈ 0 → S π ( f ) ≈ S π ′ ( f )) � ,

  33. Introduction: NSA 101 Mining NSA Additional results The unreasonable effectiveness of NSA Example II: Continuity implies Riemann integration From a proof that nonstandard uniformly continuity implies nonstandard Riemann integration in P, i.e. � ( ∀ f : R → R ) ( ∀ x , y ∈ [0 , 1])[ x ≈ y → f ( x ) ≈ f ( y )] ↓ ( ∀ π, π ′ ∈ P ([0 , 1]))( � π � , � π ′ � ≈ 0 → S π ( f ) ≈ S π ′ ( f )) � , we can extract a term s 2 such that for f : R → R and modulus g 1 : ( ∀ k 0 )( ∀ x , y ∈ [0 , 1])( | x − y | < g ( k ) → | f ( x ) − f ( y ) | < 1 1 k ) (3) ↓ ( ∀ k ′ )( ∀ π, π ′ ∈ P ([0 , 1])) � � s ( g , k ′ ) → | S π ( f ) − S π ′ ( f ) | ≤ 1 1 � π � , � π ′ � < k ′

  34. Introduction: NSA 101 Mining NSA Additional results The unreasonable effectiveness of NSA Example II: Continuity implies Riemann integration From a proof that nonstandard uniformly continuity implies nonstandard Riemann integration in P, i.e. � ( ∀ f : R → R ) ( ∀ x , y ∈ [0 , 1])[ x ≈ y → f ( x ) ≈ f ( y )] ↓ ( ∀ π, π ′ ∈ P ([0 , 1]))( � π � , � π ′ � ≈ 0 → S π ( f ) ≈ S π ′ ( f )) � , we can extract a term s 2 such that for f : R → R and modulus g 1 : ( ∀ k 0 )( ∀ x , y ∈ [0 , 1])( | x − y | < g ( k ) → | f ( x ) − f ( y ) | < 1 1 k ) (3) ↓ ( ∀ k ′ )( ∀ π, π ′ ∈ P ([0 , 1])) � � s ( g , k ′ ) → | S π ( f ) − S π ′ ( f ) | ≤ 1 1 � π � , � π ′ � < k ′ is provable in E-PA ω .

  35. Introduction: NSA 101 Mining NSA Additional results The unreasonable effectiveness of NSA Example II: Continuity implies Riemann integration From a proof that nonstandard uniformly continuity implies nonstandard Riemann integration in P, i.e. � ( ∀ f : R → R ) ( ∀ x , y ∈ [0 , 1])[ x ≈ y → f ( x ) ≈ f ( y )] ↓ ( ∀ π, π ′ ∈ P ([0 , 1]))( � π � , � π ′ � ≈ 0 → S π ( f ) ≈ S π ′ ( f )) � , we can extract a term s 2 such that for f : R → R and modulus g 1 : ( ∀ k 0 )( ∀ x , y ∈ [0 , 1])( | x − y | < g ( k ) → | f ( x ) − f ( y ) | < 1 1 k ) (3) ↓ ( ∀ k ′ )( ∀ π, π ′ ∈ P ([0 , 1])) � � s ( g , k ′ ) → | S π ( f ) − S π ′ ( f ) | ≤ 1 1 � π � , � π ′ � < k ′ is provable in E-PA ω . (and the same for E-HA ω )

  36. Introduction: NSA 101 Mining NSA Additional results The unreasonable effectiveness of NSA Example II: Continuity implies Riemann integration From a proof that nonstandard uniformly continuity implies nonstandard Riemann integration in P, i.e. � ( ∀ f : R → R ) ( ∀ x , y ∈ [0 , 1])[ x ≈ y → f ( x ) ≈ f ( y )] ↓ ( ∀ π, π ′ ∈ P ([0 , 1]))( � π � , � π ′ � ≈ 0 → S π ( f ) ≈ S π ′ ( f )) � , we can extract a term s 2 such that for f : R → R and modulus g 1 : ( ∀ k 0 )( ∀ x , y ∈ [0 , 1])( | x − y | < g ( k ) → | f ( x ) − f ( y ) | < 1 1 k ) (3) ↓ ( ∀ k ′ )( ∀ π, π ′ ∈ P ([0 , 1])) � � s ( g , k ′ ) → | S π ( f ) − S π ′ ( f ) | ≤ 1 1 � π � , � π ′ � < k ′ is provable in E-PA ω . (and the same for E-HA ω ) But (3) is the theorem expressing continuity implies Riemann integration from constructive analysis and computable math.

  37. Introduction: NSA 101 Mining NSA Additional results Explicit Reverse Mathematics Example III: The monotone convergence theorem

  38. Introduction: NSA 101 Mining NSA Additional results Explicit Reverse Mathematics Example III: The monotone convergence theorem From a proof in P of the following equivalence: � ( ∀ st f 1 ) ( ∃ n ) f ( n ) = 0 → ( ∃ st m ) f ( m ) = 0] (Π 0 1 -TRANS) ↔ Every standard monotone sequence in [0 , 1] nonstandard converges

  39. Introduction: NSA 101 Mining NSA Additional results Explicit Reverse Mathematics Example III: The monotone convergence theorem From a proof in P of the following equivalence: � ( ∀ st f 1 ) ( ∃ n ) f ( n ) = 0 → ( ∃ st m ) f ( m ) = 0] (Π 0 1 -TRANS) ↔ Every standard monotone sequence in [0 , 1] nonstandard converges two terms u , v can be extracted such that E-PA ω proves

  40. Introduction: NSA 101 Mining NSA Additional results Explicit Reverse Mathematics Example III: The monotone convergence theorem From a proof in P of the following equivalence: � ( ∀ st f 1 ) ( ∃ n ) f ( n ) = 0 → ( ∃ st m ) f ( m ) = 0] (Π 0 1 -TRANS) ↔ Every standard monotone sequence in [0 , 1] nonstandard converges two terms u , v can be extracted such that E-PA ω proves If Ξ 2 is the Turing jump functional, then u (Ξ) computes the rate of convergence of any monotone sequence in [0 , 1].

  41. Introduction: NSA 101 Mining NSA Additional results Explicit Reverse Mathematics Example III: The monotone convergence theorem From a proof in P of the following equivalence: � ( ∀ st f 1 ) ( ∃ n ) f ( n ) = 0 → ( ∃ st m ) f ( m ) = 0] (Π 0 1 -TRANS) ↔ Every standard monotone sequence in [0 , 1] nonstandard converges two terms u , v can be extracted such that E-PA ω proves If Ξ 2 is the Turing jump functional, then u (Ξ) computes the rate of convergence of any monotone sequence in [0 , 1]. If Ψ 1 → 1 computes the rate of convergence of any monotone sequence in [0 , 1], then v (Ψ) is the Turing jump functional.

  42. Introduction: NSA 101 Mining NSA Additional results Explicit Reverse Mathematics Example III: The monotone convergence theorem From a proof in P of the following equivalence: � ( ∀ st f 1 ) ( ∃ n ) f ( n ) = 0 → ( ∃ st m ) f ( m ) = 0] (Π 0 1 -TRANS) ↔ Every standard monotone sequence in [0 , 1] nonstandard converges two terms u , v can be extracted such that E-PA ω proves If Ξ 2 is the Turing jump functional, then u (Ξ) computes the rate of convergence of any monotone sequence in [0 , 1]. If Ψ 1 → 1 computes the rate of convergence of any monotone sequence in [0 , 1], then v (Ψ) is the Turing jump functional. The above is the EXPLICIT equivalence ACA 0 ↔ MCT.

  43. Introduction: NSA 101 Mining NSA Additional results Explicit Reverse Mathematics Example III: The monotone convergence theorem From a proof in P of the following equivalence: � ( ∀ st f 1 ) ( ∃ n ) f ( n ) = 0 → ( ∃ st m ) f ( m ) = 0] (Π 0 1 -TRANS) ↔ Every standard monotone sequence in [0 , 1] nonstandard converges two terms u , v can be extracted such that E-PA ω proves If Ξ 2 is the Turing jump functional, then u (Ξ) computes the rate of convergence of any monotone sequence in [0 , 1]. If Ψ 1 → 1 computes the rate of convergence of any monotone sequence in [0 , 1], then v (Ψ) is the Turing jump functional. The above is the EXPLICIT equivalence ACA 0 ↔ MCT. (and H?)

  44. Introduction: NSA 101 Mining NSA Additional results Explicit Reverse Mathematics Example IV: Group Theory

  45. Introduction: NSA 101 Mining NSA Additional results Explicit Reverse Mathematics Example IV: Group Theory From a proof in P of the following equivalence: � ( ∀ st f 1 ) ( ∃ g 1 )( ∀ n ) f ( gn ) = 0 → ( ∃ st g 1 )( ∀ st m ) f ( gm ) = 0] (Π 1 1 -TRANS) ↔ Every standard countable abelian group is a direct sum of a standard divisible group and a standard reduced group

  46. Introduction: NSA 101 Mining NSA Additional results Explicit Reverse Mathematics Example IV: Group Theory From a proof in P of the following equivalence: � ( ∀ st f 1 ) ( ∃ g 1 )( ∀ n ) f ( gn ) = 0 → ( ∃ st g 1 )( ∀ st m ) f ( gm ) = 0] (Π 1 1 -TRANS) ↔ Every standard countable abelian group is a direct sum of a standard divisible group and a standard reduced group two terms u , v can be extracted such that E-PA ω proves

  47. Introduction: NSA 101 Mining NSA Additional results Explicit Reverse Mathematics Example IV: Group Theory From a proof in P of the following equivalence: � ( ∀ st f 1 ) ( ∃ g 1 )( ∀ n ) f ( gn ) = 0 → ( ∃ st g 1 )( ∀ st m ) f ( gm ) = 0] (Π 1 1 -TRANS) ↔ Every standard countable abelian group is a direct sum of a standard divisible group and a standard reduced group two terms u , v can be extracted such that E-PA ω proves If Ξ 2 is the Suslin functional, then u (Ξ) computes the divisible and reduced group for countable abelian groups.

  48. Introduction: NSA 101 Mining NSA Additional results Explicit Reverse Mathematics Example IV: Group Theory From a proof in P of the following equivalence: � ( ∀ st f 1 ) ( ∃ g 1 )( ∀ n ) f ( gn ) = 0 → ( ∃ st g 1 )( ∀ st m ) f ( gm ) = 0] (Π 1 1 -TRANS) ↔ Every standard countable abelian group is a direct sum of a standard divisible group and a standard reduced group two terms u , v can be extracted such that E-PA ω proves If Ξ 2 is the Suslin functional, then u (Ξ) computes the divisible and reduced group for countable abelian groups. If Ψ 1 → 1 computes computes the divisible and reduced group for countable abelian groups, then v (Ψ) is the Suslin functional.

  49. Introduction: NSA 101 Mining NSA Additional results Explicit Reverse Mathematics Example IV: Group Theory From a proof in P of the following equivalence: � ( ∀ st f 1 ) ( ∃ g 1 )( ∀ n ) f ( gn ) = 0 → ( ∃ st g 1 )( ∀ st m ) f ( gm ) = 0] (Π 1 1 -TRANS) ↔ Every standard countable abelian group is a direct sum of a standard divisible group and a standard reduced group two terms u , v can be extracted such that E-PA ω proves If Ξ 2 is the Suslin functional, then u (Ξ) computes the divisible and reduced group for countable abelian groups. If Ψ 1 → 1 computes computes the divisible and reduced group for countable abelian groups, then v (Ψ) is the Suslin functional. The above is the EXPLICIT equivalence Π 1 1 -CA 0 ↔ DIV.

  50. Introduction: NSA 101 Mining NSA Additional results The unreasonable effectiveness of NSA Example V: Compactness

  51. Introduction: NSA 101 Mining NSA Additional results The unreasonable effectiveness of NSA Example V: Compactness X is nonstandard compact IFF ( ∀ x ∈ X )( ∃ st y ∈ X )( x ≈ y ).

  52. Introduction: NSA 101 Mining NSA Additional results The unreasonable effectiveness of NSA Example V: Compactness X is nonstandard compact IFF ( ∀ x ∈ X )( ∃ st y ∈ X )( x ≈ y ). From a proof in P of the following equivalence: [0 , 1] is nonstandard compact (STP) ↔ Every ns-cont. function is ns-Riemann integrable on [0 , 1]

  53. Introduction: NSA 101 Mining NSA Additional results The unreasonable effectiveness of NSA Example V: Compactness X is nonstandard compact IFF ( ∀ x ∈ X )( ∃ st y ∈ X )( x ≈ y ). From a proof in P of the following equivalence: [0 , 1] is nonstandard compact (STP) ↔ Every ns-cont. function is ns-Riemann integrable on [0 , 1] two terms u , v can be extracted such that E-PA ω proves

  54. Introduction: NSA 101 Mining NSA Additional results The unreasonable effectiveness of NSA Example V: Compactness X is nonstandard compact IFF ( ∀ x ∈ X )( ∃ st y ∈ X )( x ≈ y ). From a proof in P of the following equivalence: [0 , 1] is nonstandard compact (STP) ↔ Every ns-cont. function is ns-Riemann integrable on [0 , 1] two terms u , v can be extracted such that E-PA ω proves If Ω 3 is the fan functional, then u (Ω) computes the Riemann integral for any cont. function on [0 , 1].

  55. Introduction: NSA 101 Mining NSA Additional results The unreasonable effectiveness of NSA Example V: Compactness X is nonstandard compact IFF ( ∀ x ∈ X )( ∃ st y ∈ X )( x ≈ y ). From a proof in P of the following equivalence: [0 , 1] is nonstandard compact (STP) ↔ Every ns-cont. function is ns-Riemann integrable on [0 , 1] two terms u , v can be extracted such that E-PA ω proves If Ω 3 is the fan functional, then u (Ω) computes the Riemann integral for any cont. function on [0 , 1]. If Ψ (1 → 1) → 1 computes the Riemann integral for any. cont function on [0 , 1], then v (Ψ) is the fan functional.

  56. Introduction: NSA 101 Mining NSA Additional results The unreasonable effectiveness of NSA Example V: Compactness X is nonstandard compact IFF ( ∀ x ∈ X )( ∃ st y ∈ X )( x ≈ y ). From a proof in P of the following equivalence: [0 , 1] is nonstandard compact (STP) ↔ Every ns-cont. function is ns-Riemann integrable on [0 , 1] two terms u , v can be extracted such that E-PA ω proves If Ω 3 is the fan functional, then u (Ω) computes the Riemann integral for any cont. function on [0 , 1]. If Ψ (1 → 1) → 1 computes the Riemann integral for any. cont function on [0 , 1], then v (Ψ) is the fan functional. = the EXPLICIT version of FAN ↔ (cont → Rieman int. on [0 , 1]).

  57. Introduction: NSA 101 Mining NSA Additional results The unreasonable effectiveness of NSA Example VI: Compactness bis Compactness has multiple non-equivalent normal forms.

  58. Introduction: NSA 101 Mining NSA Additional results The unreasonable effectiveness of NSA Example VI: Compactness bis Compactness has multiple non-equivalent normal forms. In Example V, the normal form of ns-compactness was a nonstandard version of FAN.

  59. Introduction: NSA 101 Mining NSA Additional results The unreasonable effectiveness of NSA Example VI: Compactness bis Compactness has multiple non-equivalent normal forms. In Example V, the normal form of ns-compactness was a nonstandard version of FAN. Here, the normal form expresses ‘the space can be discretely divided into infinitesimal pieces’.

  60. Introduction: NSA 101 Mining NSA Additional results The unreasonable effectiveness of NSA Example VI: Compactness bis Compactness has multiple non-equivalent normal forms. In Example V, the normal form of ns-compactness was a nonstandard version of FAN. Here, the normal form expresses ‘the space can be discretely divided into infinitesimal pieces’. From a proof in P of the following theorem For a uniformly ns-cont. f and ns-compact X , f ( X ) is also ns-compact.

  61. Introduction: NSA 101 Mining NSA Additional results The unreasonable effectiveness of NSA Example VI: Compactness bis Compactness has multiple non-equivalent normal forms. In Example V, the normal form of ns-compactness was a nonstandard version of FAN. Here, the normal form expresses ‘the space can be discretely divided into infinitesimal pieces’. From a proof in P of the following theorem For a uniformly ns-cont. f and ns-compact X , f ( X ) is also ns-compact.

  62. Introduction: NSA 101 Mining NSA Additional results The unreasonable effectiveness of NSA Example VI: Compactness bis Compactness has multiple non-equivalent normal forms. In Example V, the normal form of ns-compactness was a nonstandard version of FAN. Here, the normal form expresses ‘the space can be discretely divided into infinitesimal pieces’. From a proof in P of the following theorem For a uniformly ns-cont. f and ns-compact X , f ( X ) is also ns-compact. a term u can be extracted such that E-PA ω proves If Ψ witnesses that X is totally bounded and g is a modulus of uniform cont. for f , then u (Ψ , g ) witnesses that f ( X ) is totally bounded.

  63. Introduction: NSA 101 Mining NSA Additional results The unreasonable effectiveness of NSA Example VI: Compactness bis Compactness has multiple non-equivalent normal forms. In Example V, the normal form of ns-compactness was a nonstandard version of FAN. Here, the normal form expresses ‘the space can be discretely divided into infinitesimal pieces’. From a proof in P of the following theorem For a uniformly ns-cont. f and ns-compact X , f ( X ) is also ns-compact. a term u can be extracted such that E-PA ω proves If Ψ witnesses that X is totally bounded and g is a modulus of uniform cont. for f , then u (Ψ , g ) witnesses that f ( X ) is totally bounded. . . . which is a theorem from constructive analysis and comp. math.

  64. Introduction: NSA 101 Mining NSA Additional results Conclusion Nonstandard Analysis is unreasonably effective as follows:

  65. Introduction: NSA 101 Mining NSA Additional results Conclusion Nonstandard Analysis is unreasonably effective as follows: a) One should focus on theorems of pure NSA, i.e. involving the nonstandard definitions of continuity, differentiation, Riemann integration, compactness, open sets, et cetera.

  66. Introduction: NSA 101 Mining NSA Additional results Conclusion Nonstandard Analysis is unreasonably effective as follows: a) One should focus on theorems of pure NSA, i.e. involving the nonstandard definitions of continuity, differentiation, Riemann integration, compactness, open sets, et cetera. b) One must work in a system P which has TERM EXTRACTION.

  67. Introduction: NSA 101 Mining NSA Additional results Conclusion Nonstandard Analysis is unreasonably effective as follows: a) One should focus on theorems of pure NSA, i.e. involving the nonstandard definitions of continuity, differentiation, Riemann integration, compactness, open sets, et cetera. b) One must work in a system P which has TERM EXTRACTION. In particular:

  68. Introduction: NSA 101 Mining NSA Additional results Conclusion Nonstandard Analysis is unreasonably effective as follows: a) One should focus on theorems of pure NSA, i.e. involving the nonstandard definitions of continuity, differentiation, Riemann integration, compactness, open sets, et cetera. b) One must work in a system P which has TERM EXTRACTION. In particular: a) Observation: Every theorem of pure NSA can be brought into the normal form ( ∀ st x )( ∃ st y ) ϕ ( x , y ) ( ϕ internal).

  69. Introduction: NSA 101 Mining NSA Additional results Conclusion Nonstandard Analysis is unreasonably effective as follows: a) One should focus on theorems of pure NSA, i.e. involving the nonstandard definitions of continuity, differentiation, Riemann integration, compactness, open sets, et cetera. b) One must work in a system P which has TERM EXTRACTION. In particular: a) Observation: Every theorem of pure NSA can be brought into the normal form ( ∀ st x )( ∃ st y ) ϕ ( x , y ) ( ϕ internal). b) P has the TERM EXTRACTION property for normal forms:

  70. Introduction: NSA 101 Mining NSA Additional results Conclusion Nonstandard Analysis is unreasonably effective as follows: a) One should focus on theorems of pure NSA, i.e. involving the nonstandard definitions of continuity, differentiation, Riemann integration, compactness, open sets, et cetera. b) One must work in a system P which has TERM EXTRACTION. In particular: a) Observation: Every theorem of pure NSA can be brought into the normal form ( ∀ st x )( ∃ st y ) ϕ ( x , y ) ( ϕ internal). b) P has the TERM EXTRACTION property for normal forms: If P proves ( ∀ st x )( ∃ st y ) ϕ ( x , y ), then from the latter proof, a term t can be extracted such that E-PA ω proves ( ∀ x )( ∃ y ∈ t ( x )) ϕ ( x , y )

  71. Introduction: NSA 101 Mining NSA Additional results Conclusion Nonstandard Analysis is unreasonably effective as follows: a) One should focus on theorems of pure NSA, i.e. involving the nonstandard definitions of continuity, differentiation, Riemann integration, compactness, open sets, et cetera. b) One must work in a system P which has TERM EXTRACTION. In particular: a) Observation: Every theorem of pure NSA can be brought into the normal form ( ∀ st x )( ∃ st y ) ϕ ( x , y ) ( ϕ internal). b) P has the TERM EXTRACTION property for normal forms: If P proves ( ∀ st x )( ∃ st y ) ϕ ( x , y ), then from the latter proof, a term t can be extracted such that E-PA ω proves ( ∀ x )( ∃ y ∈ t ( x )) ϕ ( x , y ) (a number of systems have the term extraction property)

  72. Introduction: NSA 101 Mining NSA Additional results Towards meta-equivalence: Hebrandisations

  73. Introduction: NSA 101 Mining NSA Additional results Towards meta-equivalence: Hebrandisations From a proof that nonstandard uniformly continuity implies nonstandard Riemann integration in P, i.e.

  74. Introduction: NSA 101 Mining NSA Additional results Towards meta-equivalence: Hebrandisations From a proof that nonstandard uniformly continuity implies nonstandard Riemann integration in P, i.e. � ( ∀ f : R → R ) ( ∀ x , y ∈ [0 , 1])[ x ≈ y → f ( x ) ≈ f ( y )] ↓ (4) ( ∀ π, π ′ ∈ P ([0 , 1]))( � π � , � π ′ � ≈ 0 → S π ( f ) ≈ S π ′ ( f )) � ,

  75. Introduction: NSA 101 Mining NSA Additional results Towards meta-equivalence: Hebrandisations From a proof that nonstandard uniformly continuity implies nonstandard Riemann integration in P, i.e. � ( ∀ f : R → R ) ( ∀ x , y ∈ [0 , 1])[ x ≈ y → f ( x ) ≈ f ( y )] ↓ (4) ( ∀ π, π ′ ∈ P ([0 , 1]))( � π � , � π ′ � ≈ 0 → S π ( f ) ≈ S π ′ ( f )) � , we can extract terms i , o such that for all f , g : R → R , and ε ′ > 0: ( ∀ x , y ∈ [0 , 1] , ε > i ( g , ε ′ ))( | x − y | < g ( ε ) → | f ( x ) − f ( y ) | < ε ) ↓ (5) ( ∀ π, π ′ ∈ P ([0 , 1])) � � π � , � π ′ � < o ( g , ε ′ ) → | S π ( f ) − S π ′ ( f ) | ≤ ε ′ �

  76. Introduction: NSA 101 Mining NSA Additional results Towards meta-equivalence: Hebrandisations From a proof that nonstandard uniformly continuity implies nonstandard Riemann integration in P, i.e. � ( ∀ f : R → R ) ( ∀ x , y ∈ [0 , 1])[ x ≈ y → f ( x ) ≈ f ( y )] ↓ (4) ( ∀ π, π ′ ∈ P ([0 , 1]))( � π � , � π ′ � ≈ 0 → S π ( f ) ≈ S π ′ ( f )) � , we can extract terms i , o such that for all f , g : R → R , and ε ′ > 0: ( ∀ x , y ∈ [0 , 1] , ε > i ( g , ε ′ ))( | x − y | < g ( ε ) → | f ( x ) − f ( y ) | < ε ) ↓ (5) ( ∀ π, π ′ ∈ P ([0 , 1])) � � π � , � π ′ � < o ( g , ε ′ ) → | S π ( f ) − S π ′ ( f ) | ≤ ε ′ � is provable in E-PA ω ,

  77. Introduction: NSA 101 Mining NSA Additional results Towards meta-equivalence: Hebrandisations From a proof that nonstandard uniformly continuity implies nonstandard Riemann integration in P, i.e. � ( ∀ f : R → R ) ( ∀ x , y ∈ [0 , 1])[ x ≈ y → f ( x ) ≈ f ( y )] ↓ (4) ( ∀ π, π ′ ∈ P ([0 , 1]))( � π � , � π ′ � ≈ 0 → S π ( f ) ≈ S π ′ ( f )) � , we can extract terms i , o such that for all f , g : R → R , and ε ′ > 0: ( ∀ x , y ∈ [0 , 1] , ε > i ( g , ε ′ ))( | x − y | < g ( ε ) → | f ( x ) − f ( y ) | < ε ) ↓ (5) ( ∀ π, π ′ ∈ P ([0 , 1])) � � π � , � π ′ � < o ( g , ε ′ ) → | S π ( f ) − S π ′ ( f ) | ≤ ε ′ � is provable in E-PA ω , AND VICE VERSA: if E-PA ω ⊢ (5), then P ⊢ (4)

Recommend


More recommend