Uncommon Descent Serving The Intelligent Design Community
meniscus

FOOTNOTE: On Einstein, Dembski, the Chi Metric and observation by the judging semiotic agent

Share
Facebook
Twitter
LinkedIn
Flipboard
Print
Email

(Follows up from here.)

Over at MF’s blog, there has been a continued stream of  objections to the recent log reduction of the chi metric in the recent CSI Newsflash thread.

Here is commentator Toronto:

__________

>> ID is qualifying a part of the equation’s terms with subjective observation.

If I do the same to Einstein’s, I might say;

E = MC^2, IF M contains more than 500 electrons,

BUT

E **MIGHT NOT** be equal to MC^2 IF M contains less than 500 electrons

The equation is no longer purely mathematical but subject to other observations and qualifications that are not mathematical at all.

Dembski claims a mathematical evaluation of information is sufficient for his CSI, but in practice, every attempt at CSI I have seen, requires a unique subjective evaluation of the information in the artifact under study.

The determination of CSI becomes a very small amount of math, coupled with an exhausting study and knowledge of the object itself.>>

_____________

A few thoughts in response:

a –> First, let us remind ourselves of the log reduction itself, starting with Dembski’s 2005 chi expression:

χ = – log2[10^120 ·ϕS(T)·P(T|H)]  . . . eqn n1

How about this (we are now embarking on an exercise in “open notebook” science):

1 –> 10^120 ~ 2^398

2 –> Following Hartley, we can define Information on a probability metric:

I = – log(p) . . .  eqn n2

3 –> So, we can re-present the Chi-metric:

Chi = – log2(2^398 * D2 * p)  . . .  eqn n3

Chi = Ip – (398 + K2) . . .  eqn n4

4 –> That is, the Dembski CSI Chi-metric is a measure of Information for samples from a target zone T on the presumption of a chance-dominated process, beyond a threshold of at least 398 bits, covering 10^120 possibilities.

5 –> Where also, K2 is a further increment to the threshold that naturally peaks at about 100 further bits . . . . As in (using Chi_500 for VJT’s CSI_lite):

Chi_500 = Ip – 500,  bits beyond the [solar system resources] threshold  . . . eqn n5

Chi_1000 = Ip – 1000, bits beyond the observable cosmos, 125 byte/ 143 ASCII character threshold . . . eqn n6

Chi_1024 = Ip – 1024, bits beyond a 2^10, 128 byte/147 ASCII character version of the threshold in n6, with a config space of 1.80*10^308 possibilities, not 1.07*10^301 . . . eqn n6a . . . .

Using Durston’s Fits from his Table 1, in the Dembski style metric of bits beyond the threshold, and simply setting the threshold at 500 bits:

RecA: 242 AA, 832 fits, Chi: 332 bits beyond

SecY: 342 AA, 688 fits, Chi: 188 bits beyond

Corona S2: 445 AA, 1285 fits, Chi: 785 bits beyond  . . . results n7

The two metrics are clearly consistent . . . .one may use the Durston metric as a good measure of the target zone’s actual encoded information content, which Table 1 also conveniently reduces to bits per symbol so we can see how the redundancy affects the information used across the domains of life to achieve a given protein’s function; not just the raw capacity in storage unit bits [= no.  of  AA’s * 4.32 bits/AA on 20 possibilities, as the chain is not particularly constrained.]

b –> In short, we are here reducing the explanatory filter to a formula. Once we have specific, observed functional information of Ip bits,  and we compare it to a threshold of a sufficiently large configuration space, we may infer that the instance of FSCI (or more broadly CSI)  is sufficiently isolated that the accessible search resources make it maximally unlikely that its best explanation is unintelligent cause by blind chance plus mechanical necessity. Instead, the best, and empirically massively supported causal explanation is design:

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Fig 1: The ID Explanatory Filter

c –> This is especially clear when we use the 1,000 bit threshold, but in fact the “practical” universe we have is our solar system. And so, since the number of Planck time quantum states of our solar system since the usual date of the big bang is not more than 10^102, something that is in a config space of 10^150 [500 bits worth of possibilities] is 48 orders of magnitude beyond that threshold.

d –> So, something from a config space of 10^150 or more (500+ functionally specific bits) is on infinite monkey analysis grounds, comfortably beyond available search resources. 1,000 bits puts it beyond the resources of the observable cosmos:

Fig 2: The Observed Cosmos search window

e –> What the reduced Chi metric is telling us is that if say we had 140 functional bits [20 ASCII characters] , we would be 360 bits short of the threshold, and in principle a random walk based search could find something like that. For, while the reduced chi metric is giving us a value, it tells us we are falling short and by how much:

Chi_500(140 bits) = 140 – 500 = – 360 specific bits, within the threshold

f –> So, the Chi_500 metric tells us instances of this could happen by chance and trial and error testing.   Indeed, that is exactly what has happened with random text generation experiments:

One computer program run by Dan Oliver of Scottsdale, Arizona, according to an article in The New Yorker, came up with a result on August 4, 2004: After the group had worked for 42,162,500,000 billion billion monkey-years, one of the “monkeys” typed, “VALENTINE. Cease toIdor:eFLP0FRjWK78aXzVOwm)-‘;8.t” The first 19 letters of this sequence can be found in “The Two Gentlemen of Verona”. Other teams have reproduced 18 characters from “Timon of Athens”, 17 from “Troilus and Cressida”, and 16 from “Richard II”.[20]

A website entitled The Monkey Shakespeare Simulator, launched on July 1, 2003, contained a Java applet that simulates a large population of monkeys typing randomly, with the stated intention of seeing how long it takes the virtual monkeys to produce a complete Shakespearean play from beginning to end. For example, it produced this partial line from Henry IV, Part 2, reporting that it took “2,737,850 million billion billion billion monkey-years” to reach 24 matching characters:

RUMOUR. Open your ears; 9r"5j5&?OWTY Z0d

g –> But, 500 bits or 72 ASCII characters, and beyond this 1,000 bits or 143 ASCII characters, are a very different proposition, relative to the search resources of the solar system or the observed cosmos.

h –> That is why, consistently, we observe CSI beyond that threshold [e.g. Toronto’s comment] being produced by intelligence, and ONLY as produced by intelligence.

i –> So, on inference to best empirically warranted explanation, and on infinite monkeys analytical grounds, we have excellent reason to have high confidence that the threshold metric is credible.

j –> As a bonus, we have exposed the strawman suggestion that the Chi metric only applies beyond the threshold. Nope, it applies within the threshold and correctly indicates that something of such an order could come about by chance and necessity within the solar system’s search resources.

k –> is a threshold metric inherently suspicious? Not at all. In control system studies, for instance, we learn that once you reduce your expression to a transfer function of form

G = [(s – z1)(s- z2) . . . ]/[(s – p1)(s-p2)(s – p3) . . . ]

. . . then, if poles appear in the RH side of the complex s-plane, you have an unstable system.

l –> A threshold, and one that, when poles approach close to the threshold from the LH half-plane, will show up in a tendency that can be detected in the frequency response as peakiness.

m –> Is the simplicity of the math in question, in the end [after you have done the hard work of specifying information, and identifying thresholds], suspicious? No, again. For instance, let us compare:

v = i* R

q = v* C

n = sin i/ sin r

F = m*a

F2 = – F1

s = k log W

E = m0*c^2

v = H0D

Ik = – log2 (pk)

E = h*νφ

n –> Each of these is elegantly simple, but awesomely powerful; indeed, the last — precisely, a threshold relationship — was a key component of Einstein’s Nobel Prize (Relativity was just plain too controversial). And, once we put them to work in practical, empirical situations, each of them ” . . .  is no longer purely mathematical but subject to other observations and qualifications that are not mathematical at all.”

(The objection is clearly selectively hyperskeptical. Since when was an expression about an empirical quantity or situation “purely mathematical”? Let’s try another expression:

Y = C + I + G + [X – M].

How are its components measured and/or estimated, and with how much application of judgement calls, including those tracing to GAAP? [Cf discussion here.] Is this expression therefore meaningless and of no utility? What about M*VT = PT*T?)

o –> So, what about that horror, the involvement of the semiotic, judging agent as observer, who may even intervene and– shudder — judge? Of course, the observer is a major part of quantum mechanics, to the point where some are tempted to make it into a philosophical position. But the problem starts long before that, e.g. look at the problem of reading a meniscus! (Try, for Hg in glass, and for water in glass — the answers are different and can affect your results.)

Fig 3: Reading a meniscus to obtain volume of a liquid is both subjective and objective (Fair use clipping.)

p –> So, there is nothing in principle or in practice wrong with looking at information, and doing exercises — e.g. see the effect of deliberately injected noise of different levels, or of random variations — to test for specificity. Axe does just this, here, showing the islands of function effect dramatically. Clipping:

. . . if we take perfection to be the standard (i.e., no typos are tolerated) then P has a value of one in 10^60. If we lower the standard by allowing, say, four mutations per string, then mutants like these are considered acceptable:

no biologycaa ioformation by natutal means
no biologicaljinfommation by natcrll means
no biolojjcal information by natiral myans

and if we further lower the standard to accept five mutations, we allow strings like these to pass:

no ziolrgicgl informationpby natural muans
no biilogicab infjrmation by naturalnmaans
no biologilah informazion by n turalimeans

The readability deteriorates quickly, and while we might disagree by one or two mutations as to where we think the line should be drawn, we can all see that it needs to be drawn well below twelve mutations. If we draw the line at four mutations, we find P to have a value of about one in 10^50, whereas if we draw it at five mutations, the P value increases about a thousand-fold, becoming one in 10^47.

q –> Let us note how — when confronted with the same sort of skepticism regarding the link between information [a “subjective” quantity] and entropy [an “objective” one tabulated in steam tables etc] — Jaynes replied:

“. . . The entropy of a thermodynamic system is a measure of the degree of ignorance of a person whose sole knowledge about its microstate consists of the values of the macroscopic quantities . . . which define its thermodynamic state. This is a perfectly ‘objective’ quantity . . . it is a function of [those variables] and does not depend on anybody’s personality. There is no reason why it cannot be measured in the laboratory.”

r –> In short, subjectivity of the investigating observer is not a barrier to the objectivity of the conclusions reached, providing they are warranted on empirical and analytical grounds. As has been provided for the Chi metric, in reduced form.  END

Comments
F/N: What I now suspect has been going on: _____________ >> Rule 1: Power is not only what you have, but what an opponent thinks you have. If your organization is small, hide your numbers in the dark and raise a din that will make everyone think you have many more people than you do. Rule 2: Never go outside the experience of your people. The result is confusion, fear, and retreat. Rule 3: Whenever possible, go outside the experience of an opponent. Here you want to cause confusion, fear, and retreat. Rule 4: Make opponents live up to their own book of rules. “You can kill them with this, for they can no more obey their own rules than the Christian church can live up to Christianity.” Rule 5: Ridicule is man’s most potent weapon. It’s hard to counterattack ridicule, and it infuriates the opposition, which then reacts to your advantage. Rule 6: A good tactic is one your people enjoy. “If your people aren’t having a ball doing it, there is something very wrong with the tactic.” Rule 7: A tactic that drags on for too long becomes a drag. Commitment may become ritualistic as people turn to other issues. Rule 8: Keep the pressure on. Use different tactics and actions and use all events of the period for your purpose. “The major premise for tactics is the development of operations that will maintain a constant pressure upon the opposition. It is this that will cause the opposition to react to your advantage.” Rule 9: The threat is more terrifying than the thing itself.
(When Alinsky leaked word that large numbers of poor people were going to tie up the washrooms of O’Hare Airport, Chicago city authorities quickly agreed to act on a longstanding commitment to a ghetto organization. They imagined the mayhem as thousands of passengers poured off airplanes to discover every washroom occupied. Then they imagined the international embarrassment and the damage to the city’s reputation.)
Rule 10: The price of a successful attack is a constructive alternative. Avoid being trapped by an opponent or an interviewer who says, “Okay, what would you do?” Rule 11: Pick the target, freeze it, personalize it, polarize it. Don’t try to attack abstract corporations or bureaucracies. Identify a responsible individual. Ignore attempts to shift or spread the blame. >> ______________ 1 --> These are of course some of Saul Alinski's Rules for [Neo-Marxist] Radicals. (And, DK, since you are monitoring to try the Rules 3, 4, 5 & 11 credibility kill by red herring- strawman- ad hominem tactic game, when on p. xix RFR, Alinsky refers to the revolution, in the context of 1971 that strongly points to a modified marxian frame of thought, but in the ideas context of exactly that: the marxian frame of thought on revolutionary transformation by the masses towards the socialist and onwards the ideal, hypothetical golden age communist state. So, to cite p.10 on the marxian frame of thought is quite legitimate, even though he is not an orthodox, Moscow or Peking partyline Marxist Leninist or Maoist. Don't forget that Marx and Engels saw ancient Christian communitarianism per Ac 2, 4 & 5 as a proto-communism, and that they actually argued that the rise of Christianity in the Empire was in effect a prototype of the triumph of socialism.) 2 --> The utter cynicism in rules 4, 5 and 11 easily explains the pattern of demands and unresponsiveness to reason and evidence we have been seeing over the past several months. 3 --> That is, the point has been to personalise, strawmanise and ridicule, not to seriously engage issues on the merits. 4 --> But the threshold of incivility was irrevocably passed this week gone, when an attack blog that imagines that vulgarity, abuse and outing behaviour are adequate responses to serious points on the merits, was spun off from MF's blog. 5 --> Such destructive polarising incivility is a revelation of the moral and intellectual bankruptcy of the objectors who resort to it, and those who enabled it by using or tolerating attempted outing tactics and the disrespect of ignoring serious inputs on the flimsiest of excuses. 6 --> But what about the issue of living up to rules? Isn't that failure a proof of hypocrisy and doesn't it mean that any tactics that expose the hypocrites are warranted? Isn't it true that we only act decisively when we think the angels are on our side and the devils on the other, and that we need to exaggerate even small points of concern in order to set the climate of retreat on the other side that makes for advantageous negotiations? 7 --> Not at all. All it reveals is the moral self-blindness of the radical objectors. 8 --> For, moral struggle to do the right is the lot of us finite, fallible, fallen, struggling and too often ill-willed sinners. Y'know, biblical illiteracy and dismissive contempt towards the scriptures that lie at the base for traditional morality in our civilisation are now so common that I will add a key citation or two on this, first from what was recently dismissed as an "obscure" Epistle by Paul -- which is actually the hard core of NT theology:
Rom 2: 1 Therefore you have no excuse, O man, every one of you who judges. For in passing judgment on another you condemn yourself, because you, the judge, practice the very same things. 2 We know that the judgment of God rightly falls on those who practice such things. 3 Do you suppose, O man-you who judge those who practice such things and yet do them yourself-that you will escape the judgment of God? 4 Or do you presume on the riches of his kindness and forbearance and patience, not knowing that God's kindness is meant to lead you to repentance? 5 But because of your hard and impenitent heart you are storing up wrath for yourself on the day of wrath when God's righteous judgment will be revealed. 6 He will render to each one according to his works: 7 to those who by patience in well-doing seek for glory and honor and immortality, he will give eternal life; 8 but for those who are self-seeking1 and do not obey the truth, but obey unrighteousness, there will be wrath and fury . . . . 13 For it is not the hearers of the law who are righteous before God, but the doers of the law who will be justified. 14 For when Gentiles, who do not have the law, by nature do what the law requires, they are a law to themselves, even though they do not have the law. 15 They show that the work of the law is written on their hearts, while their conscience also bears witness, and their conflicting thoughts accuse or even excuse them 16 on that day when, according to my gospel, God judges the secrets of men by Christ Jesus. Gal 6: 1 Brothers,1 if anyone is caught in any transgression, you who are spiritual should restore him in a spirit of gentleness. Keep watch on yourself, lest you too be tempted. 2 Bear one another's burdens, and so fulfill the law of Christ. 3 For if anyone thinks he is something, when he is nothing, he deceives himself. 4 But let each one test his own work, and then his reason to boast will be in himself alone and not in his neighbor. 5 For each will have to bear his own load. James 3:4 Look at the ships also: though they are so large and are driven by strong winds, they are guided by a very small rudder wherever the will of the pilot directs. 5 So also the tongue is a small member, yet it boasts of great things. How great a forest is set ablaze by such a small fire! 6 And the tongue is a fire, a world of unrighteousness. The tongue is set among our members, staining the whole body, setting on fire the entire course of life,1 and set on fire by hell.2 7 For every kind of beast and bird, of reptile and sea creature, can be tamed and has been tamed by mankind, 8 but no human being can tame the tongue. It is a restless evil, full of deadly poison. 9 With it we bless our Lord and Father, and with it we curse people who are made in the likeness of God. 10 From the same mouth come blessing and cursing. My brothers,3 these things ought not to be so. 11 Does a spring pour forth from the same opening both fresh and salt water? 12 Can a fig tree, my brothers, bear olives, or a grapevine produce figs? Neither can a salt pond yield fresh water. 13 Who is wise and understanding among you? By his good conduct let him show his works in the meekness of wisdom. 14 But if you have bitter jealousy and selfish ambition in your hearts, do not boast and be false to the truth. 15 This is not the wisdom that comes down from above, but is earthly, unspiritual, demonic. 16 For where jealousy and selfish ambition exist, there will be disorder and every vile practice. 17 But the wisdom from above is first pure, then peaceable, gentle, open to reason, full of mercy and good fruits, impartial and sincere. 18 And a harvest of righteousness is sown in peace by those who make peace. [ESV]
9 --> So, as Jesus of Nazareth highlighted, a key task is to be aware of the potential planks in our own eyes even as we set out to help our BROTHERS and SISTERS with the sawdust that has got in their eyes. Likewise, let me add from the relevant part of the Sermon on the Mount:
Matt 7: 1 “Judge not, that you be not judged. 2 For with the judgment you pronounce you will be judged, and with the measure you use it will be measured to you. 3 Why do you see the speck that is in your brother's eye, but do not notice the log that is in your own eye? 4 Or how can you say to your brother, ‘Let me take the speck out of your eye,’ when there is the log in your own eye? 5 You hypocrite, first take the log out of your own eye, and then you will see clearly to take the speck out of your brother's eye. 6 “Do not give dogs what is holy, and do not throw your pearls before pigs, lest they trample them underfoot and turn to attack you. [ESV]
10 --> Once there is a failure to accept that partnership in moral struggle, the self-blindness we have been seeing leads to a destructive demonisation of the other, and this is a major root of the arrogance, disrespect, undue polarisation, outright rudeness, contempt, disrespect and hostility verging on hate we have so plainly seen. 11 --> And, these are of course precisely the sort of signs of might makes right amorality triggered by evolutionary materialism that Plato warned against 2350 years ago in The Laws Bk X. 12 --> And, it is precisely the same Plato's Cave moral blindness that makes the person who launched an attack blog not see the irony of dismissively citing the clip from Plato but not recognising how aptly it applied to his sort of rude and disrespectful factionalism. ______________ It is high time that we do better than that. GEM of TKIkairosfocus
May 29, 2011
May
05
May
29
29
2011
12:20 AM
12
12
20
AM
PDT
Mnug: "But when you keep repeating “show me the target” and I keep saying, “there are multiple targets,” one has to wonder. 1. If I can show you just one target in ev would you be satisfied? 2. What would convince you that what I am showing you would qualify to meet your expectation of what constitutes a target in ev?" Why not point out one of the targets and see what she says? I'm assuming a target in this context is a goal in the program against which new 'individuals' are measured and ones that more closely match the target are allowed to 'breed' and the rest are destroyed? Should be easy enough to show the target and the place in the code where the comparison is made.ellazimm
May 28, 2011
May
05
May
28
28
2011
11:39 PM
11
11
39
PM
PDT
MathGrrl @253:
Please point out the target.
You would not recognize a target if one was painted on your forehead. I refuse to humor someone who doesn't know what a search is, and doesn't understand what a target is. At my post in @241 I asked you to demonstrate your understanding of searches and targets. Let me know when you have done so. I also requested that you demonstrate that you understand algorithms and evolutionary algorithms. I'm still waiting. Until then, I'd be wasting my time with someone who doesn't know what I am talking about. If we can get on the same page concerning the subject of discussion perhaps we would have some basis on which to proceed. But you've shown a fundamental lack of competency to understand and discuss these issues. I'm willing to help. I am not saying you're incapable or unwilling. After all, you were the one who came here to UD claiming that you had already grasped all the fundamental ideas required to understand these subjects. But when you keep repeating "show me the target" and I keep saying, "there are multiple targets," one has to wonder. 1. If I can show you just one target in ev would you be satisfied? 2. What would convince you that what I am showing you would qualify to meet your expectation of what constitutes a target in ev? Your demands are impossible to meet, because they are impossible demands. They are impossible demands because they refuse to define what qualifies as having met the demand. Don't pretend you are being reasonable. No one here accepts that claim, because all the evidence to date demonstrates otherwise. Can you change? Will you?Mung
May 28, 2011
May
05
May
28
28
2011
11:28 PM
11
11
28
PM
PDT
MathGrrl:
Nope, just questions. I can’t force anyone to answer them, so they’re certainly not demands. I note that you failed to answer them in your comment. If you choose to do so, I would be interested in reading your response.
So the difference between a question and a demand is that one can force a response to a demand but one cannot force a response to a question? If you were interested in reading my response, you would have read my response. You didn't read my response, so I conclude that you were not interested in reading my response. Please don't pretend interest where you have none. It's insulting. You've claimed to be interested in Intelligent Design. Prove it. I'm amenable to discussion. I ask for just one "question" which you have asked to which I have not provided a response. One ping. One ping only. (In my best Sean Connery accent.) On the other side, you've appeared here with numerous un-substantiated claims, such as your claim that ev has no targets. Do you agree or disagree that you have proffered such claims? Need I provide links? You have also made claims about Schneider's response to the Montanez paper which are likewise without basis in fact. If you were only here "asking questions," that would be one thing. But you're not here just asking questions. You are also here making assertions. So the burden to answer is not just upon me, and kf, and cy, it's also upon you. Yet while we have all provided answers, you have provided none. You have merely engaged in repeating your demands.Mung
May 28, 2011
May
05
May
28
28
2011
11:01 PM
11
11
01
PM
PDT
MathGrrl @253:
Proof by repeated assertion is unconvincing, to say the least.
Thank you, thank you, thank you! I agree! Please stop repeating yourself. Your repeated assertions fail to convince anyone. But your claim that I am repeating myself lacks any factual basis. What I have done, repeatedly, is seek ways towards dialogue. What you have done, repeatedly, is avoid dialogue.Mung
May 28, 2011
May
05
May
28
28
2011
09:57 PM
9
09
57
PM
PDT
MathGrrl @250:
With respect, you really should read the source material of the ev paper and Schneider’s PhD thesis for yourself. There is no Hamming Oracle in ev and your characterization of “let the targets wander around a bit” doesn’t reflect how ev models known evolutionary mechanisms.
With respect (I swear I've said this before) you really should read the source material of the ev paper and Schneider’s PhD thesis for yourself. You don't understand what a Hamming Oracle is. You don't understand what a Hamming Distance is. You don't understand how ev works. I would be willing to swear on a stack of Bibles that I've already explained what it is that ev is intended to model. Did you even read what I wrote? The "genome" is subject to mutation. That includes both the "recognizer" and the binding sites. What about that is so difficult for you to understand?Mung
May 28, 2011
May
05
May
28
28
2011
09:45 PM
9
09
45
PM
PDT
MathGrrl @247:
There is no Hamming Oracle in the ev implementation.
First, one must understand what a Hamming Oracle is. Schneider apparently knows what a hamming oracle is, and what a hamming distance is, and thus does not launch as an objection to the Montanez paper that ev does not employ such an oracle. MathGrrl, on the other hand, apparently does not know what a Hamming Oracle is or what a Hamming Distance is. I explicitly posed those questions to MathGrrl in my post @244. She could have done the research. It certainly looks like she couldn't be bothered, and thus once again demonstrates a true lack of desire to understand the issues which are being debated. Hamming Distance I repeat. Schneider does not object to the Montanez paper on this matter. See for yourself: http://www-lmmb.ncifcrf.gov/~toms/paper/ev/dembski/dissection.htmlMung
May 28, 2011
May
05
May
28
28
2011
09:32 PM
9
09
32
PM
PDT
Schneider has responded to the Montanez et al. paper and demonstrated that the authors misunderstand significant and salient points about ev.
The Schneider response to the Montanez paper has been shown to be without merit. It was not that Montanez et al failed to understand ev, it was that Schneider failed to understand the Montanez paper. No Free Lunch Schneider's response was apparently off the cuff and not well considered as demonstrated by his failure to address the issues raised by the Montanez paper. I look forward to seeing MathGrrl's continued participation in discussion on this matter.Mung
May 28, 2011
May
05
May
28
28
2011
09:19 PM
9
09
19
PM
PDT
MG: Perhaps it has not dawned on you that the situation has now fundamentally changed, once your side has tolerated outing behaviour and increasingly disrespectful rhetoric leading to the creation of an attack blog that resorts to vulgarity as well as slander-laced outing behaviour as its main tactics. Madam, you are now associated with and unavoidably tainted by a cesspit of misbehaviour, and have a lot to answer for. As was already noted long since above. I see where you try above to discredit and dismiss the analysis of ev that fits with what we can see for ourselves. Sorry, the "don't believe yer lyin eyes" tactic is long past its sell-by date. And as for "the journal has only published three articles . . . " that is simply rudely out of order and disrespectful to the need to address issues on the merits. Yes, Mr Schneider denies that the situation with ev is as described, as would be expected. His core problem is not with how long BC has been published or how many articles have been published or who sits on its editorial board [can you kindly compare the editorial policies of Annalen Der Physik c 1905 and its decision to publish four somewhat controversial articles by a then unknown patents clerk with a freshly minted PhD granted in the context of an appeal by one of the members of the panel of reviewers?], or with whether he can try to make it out that once a target [or a cluster of such] moves it is not being tracked and hit by the equivalent of a barrage of guided missiles, but with the facts we can see for ourselves. And, yes, I am saying that ev is in effect a software simulation of an inefficient servo mechanism, one evidently prone to instability and needing a lot of tweaking to get it working as desired; as Mung documented. In short, we could picture ev as a barrage of self-replicating missiles chasing a moving formation, where in each generation half lose lock and are self-destructed, being replaced by doubling the half population that remains, which are in closer to lock condition. As for the there is no Hamming oracle assertion, pardon me but the number of mistakes metric is a Hamming metric. And the number of mistakes is used to cull the population, i.e. we see exactly a Hamming oracle --
[from previously excerpted at 196, from the BC paper:] f/n 3: "A Hamming oracle uses the Hamming distance (number of bits that differ from a target sequence) as its fitness metric" where from f/n 2: "A software oracle is a software object that answers queries posed to it. In our case, a software oracle is a function that takes in a configuration and returns a value denoting the fitness of that configuration"
-- on warmer colder hill climbing. All of course within a conveniently and intelligently set up island of function where trends get you pointed right. The only sort of evolution that such an entity would even crudely model would be micro-evo, which is not in dispute even by modern young earth creationists. The use of such fitness functions and trends is the fatal flaw, as this begs the question of islands of function in vast seas of non-function. Which is exactly the issue that the CSI metrics highlight. Before you can non-question- beggingly hill climb within an island of function, you must first get there, i.e. the challenge that a GA should first generate itself out of lucky noise into a functioning program perhaps by starting with a Hello World, and evolving step by functional step, is valid. And, unanswered. And, we have abundant evidence of the climate of hostility, not within a journal, but across a wide cross section of the academic community, and now to the point where I see people who imagine that outing behaviour and crude vulgarities suffice to respond on matters of fact, reasoning and logic. You ought to be ashamed of the level your side has sunk to. And, I see where you have again plainly deliberately dodged aside from the specific response in 34 - 5 above [and that in earlier threads, which gave relevant analyses and calculations on cases that were illustrative, using data supplied in links and in at least one case data provided by you], just as earlier you deliberately dodged the fact that I gave summary responses in 23 -4 (with explanation of a serious moral hazard in 28) and in 34 - 5. As of now, this sort of clever selection tactic has to be seen as a willfully deceptive strawman tactic, not a mere accidental oversight. It has happened far too many times. I therefore reiterate the challenge that you have so assiduously and cleverly ducked again, which leads a reasonable onlooker to infer that the most probable explanation is that you resort to rhetorical tricks of distraction because you have no serious answer on the merits, and no reasonable explanation for the more unsavoury actions that have occurred, such as the snide allusion to how Galileo was forced to recant by threat of torture, when in fact the ones using force and threats in the modern discussion of design theory are the materialist neo magisterium in the holy lab coats, as can be seen from the recent Gaskell case [and the still playing out fiasco at Synthese], and from others ranging back through Sternberg and onward to Bishop and Kenyon. And so, I repeat:
On CSI and its "rigour," that has been addressed over and over again, in most specificity to the issue of rigour, at 34 - 5 above. Similarly, the talking points MG tends to use over and over as thought hey have not been cogently answered, were last dissected in 23 - 24 above. And, the overall summing up of the issues MG has needed to explain herself on has been kept up in the editorial response to Graham at no 1 in the CSI newsflash thread; which MG has persistently ignored. When it comes to ev, 137 above shows my links to the places in the CSI Newsflash thread where it is dissected by Mung. (One of MG's tactics seems to be to wait until something is buried under enough posts in a thread, or has been continued in a successor thread, before repeating the assertion that was rebutted.) She knows or should know better than she has acted.
Drumbeat repetition of already cogently answered claims as though there has been no moving on beyond the point where such were asked, is not a responsible reply. In that context, making additional demands, especially in a climate of the sort of vulgarity and outing behaviour already seen, comes across as disrespectful and uncivil. The attempt to discredit and dismiss those on the other side without seriously addressing issues on the merits comes across as outright rude. In that context, repeated refusal to address reasonable response, comes across as arrogant. It is your side that has worked very hard to polarise the situation, and so you now have to live with the consequences, madam. You have a lot of fence mending to do, to even begin to come across as a reasonable person engaging a reasonable discussion on reasonable terms. In short, "congratulations": your ilk of objectors associated with MF's blog have successfully undermined the presumption of good faith on the part of such objectors to the design inference and to CSI. So, from now on, you and others of like ilk have to first establish that you are civil persons acting in good faith to be entertained for reasonable discussion. Which you have not even begun to address. (We know enough about the Alinsky methods, attitudes and tactics.) Good day, madam. GEM of TKIkairosfocus
May 28, 2011
May
05
May
28
28
2011
01:20 AM
1
01
20
AM
PDT
Mung, In your post 245 you provide a reasonable overview of ev that should allow us to resolve the question of whether or not it can be modeled as a targeted search. Thank you for that.
1. Each “genome” contains multiple binding sites. 2. Each “genome” contains a recognizer. What, you may reasonably ask, is the purpose of the recognizer?
Schneider makes it clear in the ev paper that he is modeling what he observed in real world biological organisms. The recognizer co-evolves with the binding sites. Neither is specified in advance and the sections of the genome that represent them will be different in different runs of ev. There is no target for either.
3. Each generation, half the population is replaced. How, you might reasonably ask, is it decided who shall "die" and who shall "live" to "reproduce?"
As described very clearly in the paper and the source code, the relative fitness of the digital genomes is related to the number of binding site errors coded for. The binding sites reflect what is observed in those real world biological organisms. This on the first page of the ev paper.
4. Schneider measures which genomes have more mistakes. 5. It is the "mistake makers" who are replaced. What, you might logically ask, determines how many "mistakes" are present in each genome?
Natural selection is modeled in ev, very simply, by removing the half of the genomes that code for the most binding site errors. This very roughly reflects the greater likelihood that a real organism with such errors would fail to reproduce.
6. The "genome" of each survivor is mutated. As a result, a binding site may be changed, or the recognizer may be changed. What, you may reasonably ask, happens if the mutations/per genome is increased? [Hint: See the Horse Race paper mentioned by kf above]
High mutation rates due to environmental factors can destroy real world populations, just as unreasonably high mutation rates can prevent digital organisms from adapting successfully to their virtual environments.
How does the program know when to stop?
It doesn't. ev runs for the number of generations specified or until the person running it gets bored. The fascinating result is that Rsequence converges to Rfrequency just as Schneider observed in real biological organisms, and it stays at that level rather than going higher or lower. That suggests that there is some profound mathematical relationship hiding in there.
Only someone who has deliberately closed their eyes to the facts would deny that ev has targets.
You haven't identified any targets. Once again, the sections of the genome that represent the recognizer and the binding sites co-evolve, with different results on every run. There is no target for the solution. The only thing I can think that you might be thinking of as a target is the number of binding sites, but that is a constraint that reflects the simple model of the real world that Schneider is investigating with ev. There is nothing in the code that identifies the number of binding site errors that provides a target for the solution. Just as in the real world, more fit genomes tend to reproduce, but what makes them fit is determined by evolutionary mechanisms.MathGrrl
May 27, 2011
May
05
May
27
27
2011
07:18 PM
7
07
18
PM
PDT
Mung,
Frankly, I think I have some idea of what MathGrrl is engaged in. How much time can it get us to waste responding to repeated repetitious repetitions.
I'm not interested in wasting anyone's time, least of all my own. I would simply like to understand CSI in sufficient detail to test the claims of ID proponents with respect to it. As I've noted before, the scientists and mathematicians I know would be thrilled to have someone showing that level of interest in their work, especially with a willingness to put in time and effort to research it.MathGrrl
May 27, 2011
May
05
May
27
27
2011
07:16 PM
7
07
16
PM
PDT
Mung,
Schnedier’s PhD thesis isn’t about ev. Not sure why you think it’s relevant, especially since it explicitly discusses targets.
Schneider's PhD thesis is of interest because he wrote the original version of ev to test his thesis before defending it. The most interesting result of ev isn't that a small subset of known evolutionary mechanisms could create Shannon information in a genome, it is that Rsequence converges to Rfrequency just as Schneider found in real world biological organisms. Understanding the thesis is essential to understanding what ev is modeling. Now, I'm curious to understand what you see as targets discussed in Schneider's PhD thesis, if you'd be kind enough to expand upon your statement.MathGrrl
May 27, 2011
May
05
May
27
27
2011
07:15 PM
7
07
15
PM
PDT
Mung,
Rather than criticize me for doing so, perhaps you could help move the conversation forward by providing a mathematically rigorous definition of CSI, as described by Dembski, and demonstrate in detail how to calculate it for the four scenarios described in my guest thread?
I don’t think it’s unfair to be critical of your stance, as you just keep repeating the same demands over and over. And that’s precisely what they are, demands.
Nope, just questions. I can't force anyone to answer them, so they're certainly not demands. I note that you failed to answer them in your comment. If you choose to do so, I would be interested in reading your response.MathGrrl
May 27, 2011
May
05
May
27
27
2011
07:15 PM
7
07
15
PM
PDT
Mung,
If you believe that ev can be modeled as a targeted search
There’s no need to model ev as a target search. It is a target search. No “model” required.
Proof by repeated assertion is unconvincing, to say the least. You also cut out the meat of my question. Here it is again for your convenience: This is a simple issue to resolve. If you believe that ev can be modeled as a targeted search, please identify the target either in the ev paper or in the Evj source code. Please point out the target.MathGrrl
May 27, 2011
May
05
May
27
27
2011
07:14 PM
7
07
14
PM
PDT
CannuckianYankee,
I think the bottom line with MG is that her question has been sufficiently answered
If that were the case, you would be able to respond to my questions to you in comment 190 of this thread. In fact, no ID proponent has yet provided a rigorous mathematical definition of CSI as described by Dembski nor has any ID proponent used such a definition to demonstrate in detail how to calculate CSI for any of the examples in my guest thread. Further, kairosfocus has failed to answer the questions I asked in comment 59 in response to his non-response to my request for a definition and example calculations. kairosfocus continues to refer to his comment 23, but that neither provides a rigorous mathematical definition of CSI as described by Dembski nor does it provide any detailed examples of how to objectively calculate the metric for any of my examples. I must admit that I am more than bemused by this entire situation. ID proponents, including kairosfocus, make some very strong claims about CSI being a clear indicator of the involvement of intelligent agency, but when asked cannot even define the metric with any rigor. Not only that, but it is very clear that no ID researcher has actually bothered to attempt to calculate CSI and publish the results for review and extension. Those two points make it clear than any claims about CSI are either literally nonsensical (due to the lack of a definition) or completely unsupported (due to the lack of calculations). What really astonishes me, though, is the response I have received when I ask for more clarity. Instead of an actual definition and real examples, I have received a number of non-responsive comments followed by assertions that my questions have been answered. This is not, in my experience, the way that scientists and mathematicians respond to questions about their areas of expertise. Rather than closing ranks with other ID proponents, please support your statement that my questions have been "sufficiently answered" by copying and pasting the rigorous mathematical definition of CSI in response to this comment, along with a detailed example of how to calculate it for one of my scenarios. If you can't do that very simply, you need to reconsider your claim.MathGrrl
May 27, 2011
May
05
May
27
27
2011
07:14 PM
7
07
14
PM
PDT
Chris Doyle,
Evolutionists like “Mathgrrl” take their starting point from Dawkins: those who don’t believe in evolution are “ignorant, stupid, or insane, (or wicked, but I’d rather not consider that).”
Care to document that statement with anything I've written here on UD or elsewhere? Based on your refusal to support your insulting comments over on Mark Frank's blog, I suspect not.
Obviously, we cannot expect any respect or decency from people like that. We can only expect rudeness, evasiveness and double-standards.
Once again you demonstrate why you have no business criticizing the online manners of others.MathGrrl
May 27, 2011
May
05
May
27
27
2011
07:13 PM
7
07
13
PM
PDT
kairosfocus,
Now, on the “co-evo” of binding and reception sites, this boils down to, we let the targets wander around a bit, so the negative feedback used to reduce “mistakes” — i.e. to reduce Hamming distance — is more of a servo-mechanism than a straight regulator; to use control system terms.
With respect, you really should read the source material of the ev paper and Schneider's PhD thesis for yourself. There is no Hamming Oracle in ev and your characterization of "let the targets wander around a bit" doesn't reflect how ev models known evolutionary mechanisms.
The fact of targetting — as Mung documented in so much specific detail — has not changed.
Indeed, the fact that ev does not have an explicit target remains.MathGrrl
May 27, 2011
May
05
May
27
27
2011
07:12 PM
7
07
12
PM
PDT
CannuckianYankee,
Just for the record, it appears that MG came here originally as an assignment of some sort from a blog called “In Moderation”
Nope, I'm not on an assignment from anyone. I've been following the ID movement in general and UD in particular since the Dover trial. Based on that experience, I find the claims by ID proponents with respect to CSI to be the most obviously testable ones I've seen here. That's what prompted my delurking. Mark Frank has a lovely online persona but that doesn't mean I'd let him be my puppeteer.MathGrrl
May 27, 2011
May
05
May
27
27
2011
07:12 PM
7
07
12
PM
PDT
CannuckianYankee,
“In that comment I make the point that “ev has a goal of co-evolving binding sites and their recognizers so that the Shannon information in the binding sites can be measured.” Darwinian ToE holds that complex life (now acknowledged as containing highly complex information in the form of DNA), and the required increase in such information, is an accident of chemical and physical processes without intervention from a mind or intelligence of any sort. Thus, evolution did not involve a computer algorithm with a goal to co-evolve, or to assist evolution in any way according to Darwinian evolutionary understandings.
I don't see anyone claiming otherwise. Genetic algorithms model what we observe in the real world, not the other way around.
Computer programs, which purport to demonstrate how evolution can produce complex biological information from mere chemical and physical processes, are therefore suspect when there is a “goal” as you say. Evolution supposedly has no goal or “target.” Schneider’s own language regarding ev is full of indications of a targeted search, as has been pointed out several times.
And yet no one has been able to point to the target in either the ev paper or in the Evj source code, nor has anyone addressed my repeated note that "ev has a goal of co-evolving binding sites and their recognizers so that the Shannon information in the binding sites can be measured. The only feedback provided is the number of sites recognized. There is no target for the content of either the binding sites or the recognizers. In fact, the makeup of those parts of the genome will be different in different runs."
The only way a computer program purporting to demonstrate the efficacy of Darwinian evolution by it’s own definition could do so, would be for the computers to first of all design and construct themselves, and then to design and construct the programs that demonstrate how it is possible for Darwinian evolution to work.
GAs such as Tierra, ev, and the Steiner problem solutions we've been discussing model known evolutionary mechanisms and known aspects of real environments. This is no different in principle from modeling the weather or plate tectonics or planetary orbits. Your objection misses this point.
"ev is an evolutionary search algorithm proposed to simulate biological evolution. As such, researchers have claimed that it demonstrates that a blind, unguided search is able to generate new information. However, analysis shows that any non-trivial computer search needs to exploit one or more sources of knowledge to make the search successful"
Leaving aside what could be a long discussion about the issues with modeling evolutionary mechanisms as a search and several other issues with the last sentence, I refer you to this paper: http://www.ncbi.nlm.nih.gov/pubmed/10781045 which is referenced on Schneider's website. The core point it makes is, as Schneider puts it, "the genetic information in biological systems comes from the environment." GAs like ev demonstrate the ability of known evolutionary mechanisms to accomplish this, without the need for any intelligent agency.MathGrrl
May 27, 2011
May
05
May
27
27
2011
07:11 PM
7
07
11
PM
PDT
kairosfocus,
The bottomline is that the — peer-reviewed, Dec 15, 2010 Bio Complexity 2010(3):1-6. doi:10.5048/BIO-C.2010.3 — Dembski et al vivisection of ev turns out to be quite correct, despite all dismissals and obfuscations.
That's quite incorrect. Schneider has responded to the Montanez et al. paper and demonstrated that the authors misunderstand significant and salient points about ev. Even the section you quote has at least one error. There is no Hamming Oracle in the ev implementation.
Let’s just say that in the current climate of hostility, Dembski et al would not have been published in such a journal unless their article had serious merit on matters of substance.
Bio-Complexity is an online journal that published three articles, including the one you reference, and a review in 2010 and one article so far in 2011. All are from ID proponents. The editorial team includes many of the authors of those articles, including Dembski and Marks. Do you really think there was much hostility directed to that paper?MathGrrl
May 27, 2011
May
05
May
27
27
2011
07:09 PM
7
07
09
PM
PDT
I’m a gunner on a ship in WWII. I’m trying to hit an enemy aircraft that threatens to destroy my ship. Does that aircraft qualify as a target in your mind? Does my ship qualify as target? Why?
My ship is moving. My gun is moving. Every other projectile is a different projectile, and they are moving as well. The aircraft is moving. I score hits and it loses pieces! The aircraft itself is changing. So many things changing. Why does that change the fact that my ship and that airplane are targets? It doesn't. Anyone can see that the fact that because things are moving or changing it doesn't mean there are no targets. MathGrrl's objection is absurd.Mung
May 27, 2011
May
05
May
27
27
2011
05:40 PM
5
05
40
PM
PDT
Dear reader, I've rejected, for now, any hope that MathGrrl is seriously interested in any of the subjects he/she/it raises. The evidence is quite clear. I have dealt with the subject of ev at length, and from all appearances MathGrrl never even read what i wrote. I image many of you feel the same way. There are many subjects which inter-twined, but lets see if we can set forth some basic facts. 1. Each "genome" contains multiple binding sites. 2. Each "genome" contains a recognizer. What, you may reasonably ask, is the purpose of the recognizer? 3. Each generation, half the population is replaced. How, you might reasonably ask, is it decided who shall "die" and who shall "live" to "reproduce?" 4. Schneider measures which genomes have more mistakes. 5. It is the "mistake makers" who are replaced. What, you might logically ask, determines how many "mistakes" are present in each genome? 6. The "genome" of each survivor is mutated. As a result, a binding site may be changed, or the recognizer may be changed. What, you may reasonably ask, happens if the mutations/per genome is increased? [Hint: See the Horse Race paper mentioned by kf above] How does the program know when to stop? Only someone who has deliberately closed their eyes to the facts would deny that ev has targets.Mung
May 26, 2011
May
05
May
26
26
2011
07:10 PM
7
07
10
PM
PDT
MathGrrl, What is a Hamming Distance? What is a Hamming Oracle? Seriously, it appears as if you lack understanding of some of the foundational concepts to understand what we are discussing here. So let's see if we can address that. How does Schneider decide where to perform his measurements for information content? Does he somehow know in advance where the binding sites are going to be? No, that can't be. You've already rejected that idea. So then, how does he know what to measure and where in order to determine whether Rfreq = Rseq? Do tell, please.Mung
May 26, 2011
May
05
May
26
26
2011
06:45 PM
6
06
45
PM
PDT
Mung: Nyquist on stability is of course closely related to the above on gain and phase margins. The Laplace transforms mentioned are closely related to the Fourier transforms used in frequency analysis of communication systems. Indeed, the jw axis is the frequency response axis. The sigma axis relates to damping (especially in the left half of the plane). It relates to transient behaviours. But this is beginning to dig into much deeper waters than a blog discussion thread can reasonably bear. Let's just note we are here looking at the beginnings of the study of linear time invariant systems, which is the beginning of the study of dynamical systems governed by differential or difference equations (the latter for discrete time). The fruit of it is that the per generation behaviour of ev can be seen as a discrete time pattern, which can then be analysed on its patterns and processes, as a target-tracking control system. In that system, "mistakes" is obviously a comparator output, a Hamming distance metric, and the process of approach is critically dependent on in effect target tracking. Behaviour is further biased by a perceptron structure, per Dembski et al, that biases towards the sort of bit patterns that are to be expected. The noisy nature of the process is suggestive on why tweaking is important to achieve convergence. GEM of TKIkairosfocus
May 26, 2011
May
05
May
26
26
2011
06:35 PM
6
06
35
PM
PDT
Frankly, I think I have some idea of what MathGrrl is engaged in. How much time can it get us to waste responding to repeated repetitious repetitions. Anyone want to help me develop a bot to respond to any future MathGrrl post? I mean heck, we already know with a high degree of certainty what the content of the post will be. This is an opportunity of ID in action! We just need to come up with the specification. Better yet, let's see if we can develop a program that can tell the difference between MathGrrl and a troll.Mung
May 26, 2011
May
05
May
26
26
2011
06:31 PM
6
06
31
PM
PDT
MathGrrl @188:
This is a simple issue to resolve.
It's not as simple as you make it out to be. Convincing someone of the presence of a target who does not believe in the existence of targets is not an easy thing!
If you believe that ev can be modeled as a targeted search...
There's no need to model ev as a target search, for that is what it is. You seem to need a lesson in the absolute basics. Please answer the following questions: 1. What is a search? 2. What is a target? 3. Can you conduct a search without a target?
...please identify the target either in the ev paper or in the Evj source code.
You didn't read what I have previously written, did you. I made it clear that ev has multiple targets. PLURAL. I also made it clear that the location of the targets change for each run, but thereafter remain fixed during the run. If you're going to continue to pretend that you're engaging any points I raised you seriously need to do a better job. One additional question: 4. Do you know what a genetic algorithm is?Mung
May 26, 2011
May
05
May
26
26
2011
06:22 PM
6
06
22
PM
PDT
MathGrrl @163:
I believe we have reached the point of significantly diminishing returns with respect to the discussion of CSI in this thread. I will continue to monitor it...
Deja vu. Is it just me, or is this the second time MathGrrl has returned to UD only to assert the same demands and then depart without actually engaging?
While I have little hope that it will happen in this particular thread, I do suspect that this topic will arise in the future here at UD and I look forward to engaging in the discussion with you then.
I don't think anyone here takes you seriously. I've offered ways to move the debate along a number of times, so have others. You've never pursued those opportunities.Mung
May 26, 2011
May
05
May
26
26
2011
05:50 PM
5
05
50
PM
PDT
Yes it is, I agree. It’s actually a parallel to what’s going on in the ev algorithm with a moving target.
I would not be at all surprised to also find a connection to coding/communication/information theory. When was radar developed?
During World War II he was particularly involved with servomechanism problems. - http://en.wikipedia.org/wiki/Ralph_Hartley
The Nyquist stability criterion can now be found in all textbooks on feedback control theory. - http://en.wikipedia.org/wiki/Harry_Nyquist
Mung
May 26, 2011
May
05
May
26
26
2011
05:38 PM
5
05
38
PM
PDT
I really do not wish to get into theological issues in-thread...
Understood and respected.Mung
May 26, 2011
May
05
May
26
26
2011
05:26 PM
5
05
26
PM
PDT
MUNG, MG & CY: Let me try to do a closed loop diagram using Text style elements: T'get -> {+/-} e --> [PLANT] -|-> o/p . . . . . . . . | ------ [F/B ] -----------| (Hope f/b path aligns: sample o/p and feed back to comparator, subtracting f/b from target i/p.) Forward path, the target sets where the plant aims for, feedback path, a sample of o/p is fed back to compare with target & create error signal. That error signal is used to drive plant so that e -> 0. When e = 0, plant is on target. As said before, in a servo, the target point is usually moving. The o/p tracks based on the dynamics of the system. This is best analysed on differential equations, converted into the complex frequency domain by Laplace transforms. In a MIMO system, the transfer is a matrix, and things get very interesting. Equivalently difference equations and z transforms [effectively delay elements] can be used. this brings in the biggie problem, lags tend to give rise to instability, and the diagrams for ev Schneider shows have such a tendency. Lags are equivalent to phase shifts and that is frequency dependent. If you are unlucky, at some point you meet the Barkhausen criterion B*Ao/l = 1 and phase lag = 180 degrees for some frequency f [the subtraction already supplied 180 degrees], so you get oscillations. Before that point, you get in effect a tendency to damped oscillations. I suspect that this is where some of the noisiness Schneider has in the graph is coming from, especially as random injections will in effect inject high frequency noise, which is exactly what will push you towards the Barkhausen criterion. Some poles in the implied transfer functions are approaching the instability criterion. Name of the game here is phase and gain margin. GEM of TKI PS: Mung, I really do not wish to get into theological issues in-thread [I only addressed Camping because of the global media effect.] But I do point you to 2 Pet 3:3 - 12 [the same text HC took out of context], for a balance.kairosfocus
May 26, 2011
May
05
May
26
26
2011
04:11 PM
4
04
11
PM
PDT
1 2 3 4 10

Leave a Reply