Exploring Gdel's Theorems and Turing Machines: A Retrospective on Infinity and Computation

g del and reading retrospective we look n.w
1 / 12
Embed
Share

Delve into the profound concepts of Gdel's theorems and Turing machines, examining the infinite number of infinities, the incompleteness theorem, and the challenges in proving the halting problem. Explore the complexities of axiomatic systems, self-consistency, and the limitations of computational algorithms in evaluating their own code.

  • Gdel
  • Turing machines
  • Infinities
  • Axiomatic systems
  • Computation

Uploaded on | 1 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.

E N D

Presentation Transcript


  1. Gdel and reading/retrospective we look at readings: the good, the bad, and the ugly Exam on Dec. 16, 8-11am, here Open book, open note, open internet Electronic submission encouraged, blue books available

  2. Infinite Number of Infinities Let A be any set, let B={all subsets of A}. Let's assume A and B have the same cardinality, i.e.: ? So even for infinite sets, the set of all subsets has more elements than the set itself. Thus an infinite number of infinities exist. Have we missed any? Is there any order of infinity in between that of the integers and that of the reals?

  3. New Topic: Turing toward Gdel Take a program that makes some input-dependent calculation. Can you prove that it will come to a conclusion, i.e. halt, for any finite input? Say that there is some algorithm for evaluating if program P will stop when given input I. In particular lets look at the smaller algorithm that evaluates whether P will stop when given its own code (a series of symbols) as input. That algorithm is itself writable as a program, P0. We can pick any output format we want. Let the output of the program be that if it evaluates the input program as un-halting, it halts. Otherwise it goes into an infinite loop. Now feed P0 as input to P0. If it halts, it has evaluated itself as un-halting. Whoops. If it doesn t halt, it has failed to evaluate itself as un-halting in a finite number of steps. So there is no program that does the general evaluation of whether programs halt or not when given their own code as input. So there certainly is no program that can evaluate what they do for arbitrary input. There s no guaranteed bug-free program. Or immune system.

  4. Gdel's Incompleteness Theorem The claim is that no finite axiomatic system sufficiently powerful to prove every fact about the integers can be both self-consistent and complete. I.e. if it's consistent, you can formulate some propositions whose validity (or falsity) cannot be demonstrated from within the axiomatic system. Express some digital computer program as a series of operations on integer numbers (e.g {0,1}), described by some finite algorithm. Each operation is just a map from some sort of number string to another. So the question of whether that program will ever halt is just a proposition about integers. If our finite axiomatic system is complete, we can either find in its provable propositions that the program will halt or that it won t. (Just list the provable propositions and keep searching down the list.) If the system is consistent we can t find proof of both claims. But we showed that can t be done. So the axiom system isn t complete.

  5. Outline of Another Proof You have various propositions about integers, (e.g "7 is prime"). There are "formulas" describing properties that may be true or false of any integer, i.e. which turn into propositions when applied to individual integers. E.g. "is prime" becomes a proposition when applied to any integer- true of 7, false of 8. The hard part of the proof is to show that you can construct a list of the formulas, i.e. you can assign some integer to each property, "prime", "expressible as sum of two squares" etc. If you want to see that part of the proof, you'll need to go to a logic class. So your various assertions about the integers are listed P1, P2, . . You can now ask is Pi[n] provable. E.g. let's say that the assertion "is prime" happened to end up as formula 12345, and you want to know if 7 is prime. You ask "Is P12345(7) provable?" Now let's pull a little trick. Let's look at assertions of the form Pn[n]. E.g. P12345(12345). BTW, is P12345(12345) true? The assertion "Pn[n] is not provable" is itself just another statement about the integer n, just like "n is not factorable" or "n is a cube" etc. Thus "Pn[n] is not provable" should have its own formula number, say M. Now you ask "Can we prove PM[M]? If the answer is yes, PM[M] is provable, by definition PM[M] is NOT provable. So the answer isn't yes. If the answer is no, PM[M] is not provable, so it is true. Thus PM[M] is true, but is not provable within the axiomatic system. Are any such statements less artificial?

  6. Back to Infinities Is there a set with more elements than the integers but fewer than the reals? The claim that there is not is called the Continuum Hypothesis It s been proven to be one of those undecidable propositions within the standard axioms about numbers. You can make a consistent set of axioms that assume it s true. Or one that assumes it s false! Does this undermine the program of mathematically modeling the universe? Is there any G del-undecidable question which maps onto some assertion about the observable world?

  7. Quantum cryptography (semi-relevant, but interesting) One can use QM correlations and the collapse of the wave function to devise perfectly encrypted communication. A perfect code is one in which the encryption scheme changes randomly from one character to the next. Then, a spy can learn nothing at all about future messages, no matter what she knows about past ones. If the sender and recipient share a table of random numbers, they can use it to ensure privacy. This one time pad is the method used by governments to send secure communications overseas. However, it requires advance (insecure) transmission of the table. The EPR apparatus can avoid this insecurity. Consider a sequence of correlated photon pairs. Let each observer (sender and receiver) sets his polarizer along the x-axis. Each observer measures a random sequence of passes and fails. This sequence must be kept secret. This is easy, because it is not sent anywhere. The two sequences are perfectly correlated, so they can be used to encode/decode messages. requires long distance QM correlations. About 250 km of optical fiber length or 23 km of satellite spacing has been achieved so far. (now 143 km between telescopes)

  8. Eavesdroppers? The presence of an eavesdropper is immediately detected, because making a measurement collapses the 2-photon wave function. This means: a:The observers can compare a subset of their sequences, looking for a loss of correlation. And they can use perfectly open communication to make this comparison, then throw out that subset b: The received message will be gibberish, due to the loss of correlation. UNLESS: the eavesdropper sends his own duplicate photon , with the same polarization as the one detected. How can that problem be avoided? Have each of the two communicators randomly change the setting on their polarization analyzers (0-90 or 45-135 degrees) In the subsequent open communication, they tell each other what their settings were, and throw out all measurements where their settings weren't the same. Now they are left with a set of perfectly correlated pairs.

  9. Quantum Cryptography What happens if you eavesdrop? You don't know which axis to set your polarizer on. Sometimes, e.g., you will use 0- 90 when the communicators use 45-135. For those, even if you send something with the polarization you measure, it will be RANDOMLY polarized along their axes. They will notice that a significant number of their photons are uncorrelated. When you later overhear what their analyzer settings were, you can say "whoops" but the damage has already been done. Is this really an unbreakable code? It uses the breakdown of local realism. What about our other assumption in deriving the Bell Inequalities: no conspiracies? Say that you bought the source of the particle pairs and the detectors with their random number generators from the TrustMe Corp. Maybe it has no particle pairs, random number generators, etc. There s just a pre-programmed output that looks exactly like the quantum case. Maybe it s a simple classical record of the output of a real quantum device they ve run previously. They know your whole code. Nothing is secure. The no conspiracy assumption is crucial for the use of Bell violations in cryptography!

  10. Quantum Computation: an amateur's introduction So long as no decoherence events occur, QM proceeds as if even single particles were undergoing many parallel experiences. (Maybe also true if there's decoherence, but then no observer gets to read more than one of the accounts of the particle's experience.) Is there a way to then use a small number of particles to generate in effect a large number of parallel processes, i.e. to get ultra-massive parallel computing with only a small computer? E.g. 4 classical two-state bits: A or a, B or b, C or c, D or d. These of course give 24=16 possible net states: ABCD, ABCd, ABcD, ABcd, AbCD, AbCd, AbcD, Abcd, aBCD, aBCd, aBcD, aBcd, abCD, abCd, abcD, abcd. Now let's take 4 quantum particles, each of which has two accessible states, as above. As in EPR, distinct particles can be entangled. In other words, the overall quantum states are not restricted to ones with specified quantum states on each individual site. So the states listed above form only the basis of a much broader set of 4-particle states, e.g. (ABCD + ABCd- ABcD- ABcd+AbCD- AbCd- AbcD+ Abcd+ aBCD - aBCd - aBcD - aBcd+ abCD+ abCd- abcD+ abcd)/4

  11. Quantum Computation Remarks The 16 phases of the 16 components can each evolve separately. In effect, that gives the equivalent of about 16 classical bits of information, inside the computer. Now what if we had 10 classical bits, rather than 4? If we convert each to a qbit, we have 210 = 1024 distinct (orthogonal) entangled states, i.e. about 1024 bits worth of information. The number of bits of information being simultaneously processed by the N sites is about 2N, rather than N. Nevertheless, there are severe limits on getting classical-like information in and out of this system, greatly restricting the types of algorithms for which quantum computation is effective.

  12. Quantum Teleportation Not as sexy as it sounds Classical teleportation is straightforward Just make a classical copy and send it Quantum teleportation runs into the no-cloning theorem There s no way to reliably duplicate some arbitrary quantum bit much less something more complicated But you can reproduce it remotely using entanglement + some ordinary classical bits + Loss of the initial bit through measurement

Related


More Related Content