Deutsch   English   Français   Italiano  
<v4cp5s$1pe0q$1@dont-email.me>

View for Bookmarking (what is this?)
Look up another Usenet article

Path: ...!weretis.net!feeder8.news.weretis.net!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: olcott <polcott333@gmail.com>
Newsgroups: comp.theory,sci.logic
Subject: Re: D correctly simulated by H proved for THREE YEARS --- rewritten
Date: Wed, 12 Jun 2024 13:24:59 -0500
Organization: A noiseless patient Spider
Lines: 122
Message-ID: <v4cp5s$1pe0q$1@dont-email.me>
References: <v428vv$2no74$2@dont-email.me> <v43ib7$38hnd$1@dont-email.me>
 <v4628o$6ero$1@dont-email.me> <v468qt$7uvj$1@dont-email.me>
 <v47joj$je45$1@dont-email.me> <v47kt3$jhs8$1@dont-email.me>
 <v47l92$je45$2@dont-email.me> <v48tt4$tqad$1@dont-email.me>
 <v4a07r$157ic$1@dont-email.me> <v4beis$1h0p6$1@dont-email.me>
 <v4cceu$1mi5i$2@dont-email.me> <v4corm$1p0h0$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Date: Wed, 12 Jun 2024 20:25:00 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="6f170c39f5487c8533188545300f883a";
	logging-data="1882138"; mail-complaints-to="abuse@eternal-september.org";	posting-account="U2FsdGVkX1/GXIFOwICuoXtRXT2taylD"
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:aZuO7MKu5PRj6VPWi2yW9uSF3Fk=
Content-Language: en-US
In-Reply-To: <v4corm$1p0h0$1@dont-email.me>
Bytes: 7535

On 6/12/2024 1:19 PM, Fred. Zwarts wrote:
> Op 12.jun.2024 om 16:47 schreef olcott:
>> On 6/12/2024 1:18 AM, Fred. Zwarts wrote:
>>> Op 11.jun.2024 om 19:07 schreef olcott:
>>>> On 6/11/2024 2:21 AM, Fred. Zwarts wrote:
>>>>> Op 10.jun.2024 om 21:47 schreef olcott:
>>>>>> THE ONLY POSSIBLE WAY for D simulated by H to have the same
>>>>>> behavior as the directly executed D(D) is for the instructions
>>>>>> of D to be incorrectly simulated by H (details provided below).
>>>>>
>>>>> Proven false. The direct execution does not ignore the call to H. 
>>>>
>>>> Yes that is the second big mistake that I am aware that I made
>>>> within the last year.
>>>>
>>>> When Ĥ is applied to ⟨Ĥ⟩
>>>> Ĥ.q0 ⟨Ĥ⟩ ⊢* embedded_H ⟨Ĥ⟩ ⟨Ĥ⟩ ⊢* Ĥ.qy ∞
>>>> Ĥ.q0 ⟨Ĥ⟩ ⊢* embedded_H ⟨Ĥ⟩ ⟨Ĥ⟩ ⊢* Ĥ.qn
>>>>
>>>> The other big mistake was what I said happens when Linz H is
>>>> applied to ⟨Ĥ⟩ ⟨Ĥ⟩. I forgot what I said and I forgot what the
>>>> correct answer was. I do remember this is was my big mistake.
>>>>
>>>> No one has ever shown any actual error with my analysis of embedded_H
>>>> applied to ⟨Ĥ⟩ ⟨Ĥ⟩. It is a verified fact that is over everyone's head
>>>> besides mine that ⟨Ĥ⟩ ⟨Ĥ⟩ correctly simulated by embedded_H cannot
>>>> possibly reach its own simulated final state of ⟨Ĥ.qn⟩.
>>>>
>>>> Everyone assumes that I must be wrong and only have dogma to base
>>>> this assumption on. I have reasoning to prove that they are wrong
>>>> yet this reasoning is over their heads.
>>>>
>>>> I have made isomorphic reasoning 100% concrete with this example
>>>> and every has simply ignored this reasoning for three years.
>>>>
>>>> *No one has verified the actual facts of this for THREE YEARS*
>>>> *No one has verified the actual facts of this for THREE YEARS*
>>>> *No one has verified the actual facts of this for THREE YEARS*
>>>>
>>>> On 5/29/2021 2:26 PM, olcott wrote:
>>>> https://groups.google.com/g/comp.theory/c/dTvIY5NX6b4/m/cHR2ZPgPBAAJ
>>>>
>>>> _D()
>>>> [00000cfc](01) 55          push ebp
>>>> [00000cfd](02) 8bec        mov ebp,esp
>>>> [00000cff](03) 8b4508      mov eax,[ebp+08]
>>>> [00000d02](01) 50          push eax       ; push D
>>>> [00000d03](03) 8b4d08      mov ecx,[ebp+08]
>>>> [00000d06](01) 51          push ecx       ; push D
>>>> [00000d07](05) e800feffff  call 00000b0c  ; call H
>>>> [00000d0c](03) 83c408      add esp,+08
>>>> [00000d0f](02) 85c0        test eax,eax
>>>> [00000d11](02) 7404        jz 00000d17
>>>> [00000d13](02) 33c0        xor eax,eax
>>>> [00000d15](02) eb05        jmp 00000d1c
>>>> [00000d17](05) b801000000  mov eax,00000001
>>>> [00000d1c](01) 5d          pop ebp
>>>> [00000d1d](01) c3          ret
>>>> Size in bytes:(0034) [00000d1d]
>>>>
>>>> It is impossible for D correctly simulated by H to ever reach
>>>> its simulated final state at its own machine address [00000d1d].
>>>>
>>>> People disagree with this by changing the subject to D not simulated
>>>> by H as all. They have been indoctrinated into believing that this
>>>> strawman deception is correct yet
>>>>
>>>> cannot possibly show the detailed steps of how D correctly simulated
>>>> by H can possibly reach its own simulated machine address of 
>>>> [00000d1d].
>>>> *Here are the steps that prove that I am correct*
>>>>
>>>> (1) Executed H simulates the first seven instructions of D.
>>>>
>>>> (2) Simulated D calls simulated H(D,D) to simulate itself again.
>>>>
>>>> (3) Simulated H simulates the first seven instructions of simulated
>>>>      simulated D.
>>>>
>>>> (4) Simulated simulated D simulated by simulated H calls
>>>>      simulated simulated H(D,D) to simulate itself again.
>>>>
>>>> *HERE ARE ALL OF CONCRETE DETAILS OF THAT*
>>>> *Begin Local Halt Decider Simulation at Machine Address:cfc*
>>>> [00000cfc][00211839][0021183d](01)  55          push ebp      ; begin D
>>>> [00000cfd][00211839][0021183d](02)  8bec        mov ebp,esp
>>>> [00000cff][00211839][0021183d](03)  8b4508      mov eax,[ebp+08]
>>>> [00000d02][00211835][00000cfc](01)  50          push eax      ; push D
>>>> [00000d03][00211835][00000cfc](03)  8b4d08      mov ecx,[ebp+08]
>>>> [00000d06][00211831][00000cfc](01)  51          push ecx      ; push D
>>>> [00000d07][0021182d][00000d0c](05)  e800feffff  call 00000b0c ; call H
>>>> *This call to H is simulated by directly executed H*
>>>>
>>>>   machine   stack     stack     machine          assembly
>>>>   address   address   data      code             language
>>>>   ========  ========  ========  ===============  =============
>>>> [00000cfc][0025c261][0025c265](01)  55          push ebp      ; begin D
>>>> [00000cfd][0025c261][0025c265](02)  8bec        mov ebp,esp
>>>> [00000cff][0025c261][0025c265](03)  8b4508      mov eax,[ebp+08]
>>>> [00000d02][0025c25d][00000cfc](01)  50          push eax      ; push D
>>>> [00000d03][0025c25d][00000cfc](03)  8b4d08      mov ecx,[ebp+08]
>>>> [00000d06][0025c259][00000cfc](01)  51          push ecx      ; push D
>>>> [00000d07][0025c255][00000d0c](05)  e800feffff  call 00000b0c ; call H
>>>> *This call to H would be simulated by simulated executed H*
>>>> *Infinitely Nested Simulation Detected Simulation Stopped*
>>>>
>>>>
>>>
>>> There is no infinite nested simulation detected,
>>
>> If I am wrong then a specific sequence of steps of D correctly
>> simulated by H where D terminates normally can be provided.
> 
> No infinite execution has been detected, 

You seem to simply not understand that D correctly simulated
by H would eventually crash due to out-of-memory error.

-- 
Copyright 2024 Olcott "Talent hits a target no one else can hit; Genius
hits a target no one else can see." Arthur Schopenhauer