Warning: mysqli::__construct(): (HY000/1203): User howardkn already has more than 'max_user_connections' active connections in D:\Inetpub\vhosts\howardknight.net\al.howardknight.net\includes\artfuncs.php on line 21
Failed to connect to MySQL: (1203) User howardkn already has more than 'max_user_connections' active connections
Warning: mysqli::query(): Couldn't fetch mysqli in D:\Inetpub\vhosts\howardknight.net\al.howardknight.net\index.php on line 66
Article <v4corm$1p0h0$1@dont-email.me>
Deutsch   English   Français   Italiano  
<v4corm$1p0h0$1@dont-email.me>

View for Bookmarking (what is this?)
Look up another Usenet article

Path: ...!news.nobody.at!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: "Fred. Zwarts" <F.Zwarts@HetNet.nl>
Newsgroups: comp.theory,sci.logic
Subject: Re: D correctly simulated by H proved for THREE YEARS --- rewritten
Date: Wed, 12 Jun 2024 20:19:33 +0200
Organization: A noiseless patient Spider
Lines: 128
Message-ID: <v4corm$1p0h0$1@dont-email.me>
References: <v428vv$2no74$2@dont-email.me> <v43ib7$38hnd$1@dont-email.me>
 <v4628o$6ero$1@dont-email.me> <v468qt$7uvj$1@dont-email.me>
 <v47joj$je45$1@dont-email.me> <v47kt3$jhs8$1@dont-email.me>
 <v47l92$je45$2@dont-email.me> <v48tt4$tqad$1@dont-email.me>
 <v4a07r$157ic$1@dont-email.me> <v4beis$1h0p6$1@dont-email.me>
 <v4cceu$1mi5i$2@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Date: Wed, 12 Jun 2024 20:19:35 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="4290016802773874b5346490e3d15051";
	logging-data="1868320"; mail-complaints-to="abuse@eternal-september.org";	posting-account="U2FsdGVkX1+HV9208P72/68W+eeWv3l4"
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:/6B+nRR3hzVOehr8k6qhwM8HlM4=
Content-Language: en-GB
In-Reply-To: <v4cceu$1mi5i$2@dont-email.me>
Bytes: 8027

Op 12.jun.2024 om 16:47 schreef olcott:
> On 6/12/2024 1:18 AM, Fred. Zwarts wrote:
>> Op 11.jun.2024 om 19:07 schreef olcott:
>>> On 6/11/2024 2:21 AM, Fred. Zwarts wrote:
>>>> Op 10.jun.2024 om 21:47 schreef olcott:
>>>>> THE ONLY POSSIBLE WAY for D simulated by H to have the same
>>>>> behavior as the directly executed D(D) is for the instructions
>>>>> of D to be incorrectly simulated by H (details provided below).
>>>>
>>>> Proven false. The direct execution does not ignore the call to H. 
>>>
>>> Yes that is the second big mistake that I am aware that I made
>>> within the last year.
>>>
>>> When Ĥ is applied to ⟨Ĥ⟩
>>> Ĥ.q0 ⟨Ĥ⟩ ⊢* embedded_H ⟨Ĥ⟩ ⟨Ĥ⟩ ⊢* Ĥ.qy ∞
>>> Ĥ.q0 ⟨Ĥ⟩ ⊢* embedded_H ⟨Ĥ⟩ ⟨Ĥ⟩ ⊢* Ĥ.qn
>>>
>>> The other big mistake was what I said happens when Linz H is
>>> applied to ⟨Ĥ⟩ ⟨Ĥ⟩. I forgot what I said and I forgot what the
>>> correct answer was. I do remember this is was my big mistake.
>>>
>>> No one has ever shown any actual error with my analysis of embedded_H
>>> applied to ⟨Ĥ⟩ ⟨Ĥ⟩. It is a verified fact that is over everyone's head
>>> besides mine that ⟨Ĥ⟩ ⟨Ĥ⟩ correctly simulated by embedded_H cannot
>>> possibly reach its own simulated final state of ⟨Ĥ.qn⟩.
>>>
>>> Everyone assumes that I must be wrong and only have dogma to base
>>> this assumption on. I have reasoning to prove that they are wrong
>>> yet this reasoning is over their heads.
>>>
>>> I have made isomorphic reasoning 100% concrete with this example
>>> and every has simply ignored this reasoning for three years.
>>>
>>> *No one has verified the actual facts of this for THREE YEARS*
>>> *No one has verified the actual facts of this for THREE YEARS*
>>> *No one has verified the actual facts of this for THREE YEARS*
>>>
>>> On 5/29/2021 2:26 PM, olcott wrote:
>>> https://groups.google.com/g/comp.theory/c/dTvIY5NX6b4/m/cHR2ZPgPBAAJ
>>>
>>> _D()
>>> [00000cfc](01) 55          push ebp
>>> [00000cfd](02) 8bec        mov ebp,esp
>>> [00000cff](03) 8b4508      mov eax,[ebp+08]
>>> [00000d02](01) 50          push eax       ; push D
>>> [00000d03](03) 8b4d08      mov ecx,[ebp+08]
>>> [00000d06](01) 51          push ecx       ; push D
>>> [00000d07](05) e800feffff  call 00000b0c  ; call H
>>> [00000d0c](03) 83c408      add esp,+08
>>> [00000d0f](02) 85c0        test eax,eax
>>> [00000d11](02) 7404        jz 00000d17
>>> [00000d13](02) 33c0        xor eax,eax
>>> [00000d15](02) eb05        jmp 00000d1c
>>> [00000d17](05) b801000000  mov eax,00000001
>>> [00000d1c](01) 5d          pop ebp
>>> [00000d1d](01) c3          ret
>>> Size in bytes:(0034) [00000d1d]
>>>
>>> It is impossible for D correctly simulated by H to ever reach
>>> its simulated final state at its own machine address [00000d1d].
>>>
>>> People disagree with this by changing the subject to D not simulated
>>> by H as all. They have been indoctrinated into believing that this
>>> strawman deception is correct yet
>>>
>>> cannot possibly show the detailed steps of how D correctly simulated
>>> by H can possibly reach its own simulated machine address of [00000d1d].
>>> *Here are the steps that prove that I am correct*
>>>
>>> (1) Executed H simulates the first seven instructions of D.
>>>
>>> (2) Simulated D calls simulated H(D,D) to simulate itself again.
>>>
>>> (3) Simulated H simulates the first seven instructions of simulated
>>>      simulated D.
>>>
>>> (4) Simulated simulated D simulated by simulated H calls
>>>      simulated simulated H(D,D) to simulate itself again.
>>>
>>> *HERE ARE ALL OF CONCRETE DETAILS OF THAT*
>>> *Begin Local Halt Decider Simulation at Machine Address:cfc*
>>> [00000cfc][00211839][0021183d](01)  55          push ebp      ; begin D
>>> [00000cfd][00211839][0021183d](02)  8bec        mov ebp,esp
>>> [00000cff][00211839][0021183d](03)  8b4508      mov eax,[ebp+08]
>>> [00000d02][00211835][00000cfc](01)  50          push eax      ; push D
>>> [00000d03][00211835][00000cfc](03)  8b4d08      mov ecx,[ebp+08]
>>> [00000d06][00211831][00000cfc](01)  51          push ecx      ; push D
>>> [00000d07][0021182d][00000d0c](05)  e800feffff  call 00000b0c ; call H
>>> *This call to H is simulated by directly executed H*
>>>
>>>   machine   stack     stack     machine          assembly
>>>   address   address   data      code             language
>>>   ========  ========  ========  ===============  =============
>>> [00000cfc][0025c261][0025c265](01)  55          push ebp      ; begin D
>>> [00000cfd][0025c261][0025c265](02)  8bec        mov ebp,esp
>>> [00000cff][0025c261][0025c265](03)  8b4508      mov eax,[ebp+08]
>>> [00000d02][0025c25d][00000cfc](01)  50          push eax      ; push D
>>> [00000d03][0025c25d][00000cfc](03)  8b4d08      mov ecx,[ebp+08]
>>> [00000d06][0025c259][00000cfc](01)  51          push ecx      ; push D
>>> [00000d07][0025c255][00000d0c](05)  e800feffff  call 00000b0c ; call H
>>> *This call to H would be simulated by simulated executed H*
>>> *Infinitely Nested Simulation Detected Simulation Stopped*
>>>
>>>
>>
>> There is no infinite nested simulation detected,
> 
> If I am wrong then a specific sequence of steps of D correctly
> simulated by H where D terminates normally can be provided.

No infinite execution has been detected, only a premature abortion. That 
is a much better explanation why H did not return.

It is like an archer who is asked to hit a target twice as far as his 
bow can reach. His bow reaches 50m and the target is at 100m. He misses.
Then he uses a new bow that reaches 100m, but now the target is at 200m. 
He is able to reach the old target, but again he misses the target for 
the new bow. He can continue, if the bow reaches further, the target is 
also further away. But note, the target is never at infinity.
Similarly, the target of the simulator is never at infinity, but always 
some steps further that the simulation goes. You can make a simulator 
that simulates further, which can reach the target of the old simulator, 
but it is unable to reach its own target. So, there is no infinite 
recursion, but the simulation always misses the target. The simulation 
is never able to simulate itself up to the end. It always aborts 
prematurely.