Is there a password in the Bible?
on
For future words, if someone or some things can expose their mystery, they will definitely cause sensation in society. The most important in China's predephones, the people's population, it is more than 13 more than a thousand years ago, Yuan Tianzhu and Li Wei together, the "push map" in the Dynasty, and the books in the book, respectively, the Tang Dynasty National Fun Dynasties. "Mushing Diagram" and other prophecy (such as: Recording Zhu Yuanzhang and Liu Bowen) have a characteristic, it is to explain the space elasticity is quite large, and the future generation can be related to the history already. Text and graphics make sense to annotate, so often the impression of the words. Therefore, every dynasty is listed as a ban on the book, but this is not the principal of the predecessor, but is afraid of rumors and four pass, people's hearts, there is a possibility of danger. So do you have some hidden predictions, can you use a scientific way to find and verify it? How does statistics prove that the Bible has a password? In August 1994, WeittenTum; Physics Professor), Less (D. Rips; Mathematics Professor) and Rosenberg (Y. Rosenberg; Expertise Calculated) in Cas (Re Kass; Carnegie University Statistics Professor and the Department of Journals, STATISTICAL Science, published a papers named "EquidistLetter Sequences in the Book of Genesis" in the Bible in Genesis. This article uses statistical methods to prove that the Bible hides many messages, and these messages are intentionally arranged, and it is absolutely arranging in writing. And the "Bible has a password", which is also officially launched. Statistical Science is one of the official Journal of Institute of Mathematical Statistics, and the Annals of Statistics, The Annals of Probability and The Annals of Applied Probability are all three international journals, and every article published is very strict. Review, so conclusions are quite reliable. (1) What is the equidistant alphabet sequence called "Equidistant Letter Sequence, Abbreviation ELS) [Note 1]? Physician Toms (King James Version)
If you start from "THOU", skip 11 letters, get f; skip the isometric 11 letters to get o. As a result, UFO (UFO) and Roswell are also hidden in this paragraph. Some people may be inferred that the Bible has long been indicated that aliens will come in the desert in Rhodes, New Mexico, USA. This example is very interesting, but the Bible is the original use of Hebrew [Note 3], not English. If you want to explore whether the Bible is really hidden, Wei Tten has considers to return to the Bible's most primitive writing version, so it adopts the
And this idea is the most interesting place! One thing to be confirmed is: Can these names and date of birth? Because if it is confused, it is far from the defined distance. If it is not too big, it means that the result is accidentally happening; if there is a significant difference, it means that this is not purely luck to explain. So they facilitate the method of statistical tests to see if such pairs are "purely accidental". (2) Statistics, you must first introduce a simple statistical concept. In the statistics, the problem of processing "accident" is to confirm that it is not a random pair, and the corresponding statistical method is called "random test". Generally, when doing statistical verification, you will first set a virtual hypothesis, which is a hypothesis that wants to overthrow it. The virtual assumption in this question is "The name and date of birth are randomly appeared, no special arrangements". This is a basic hypothesis that use terminology is a pairing arrangement method, the probability is the same. At this time, it becomes a statistical problem, and must be verified that it should refuse or accept this virtual assumption. In terms of statistics, the size of the statistic is used as a guidelines that accept the "verification". Therefore, Wei Tten first defined four verification statistics. The following only two "simplified" forms: P1 () =, p2 () = z / i! Where z = c (xi, y (i)), m = # {i: c (xi, y (i)) 0.2} The} is from {1, ..., 32}. One of themselves "one-to-one functions". ( (1), ..., (32)) is an arrangement of the number of (1, ..., 32) to rearrange the position. If we replace the birthday of the i-bit (i), the distance is changed from C (xi, yi) into C (Xi, Y (i)). N is all possible pairs, namely n = 32! . The statistical significance of the statistic P1 follows P2 is generally understood to be a similar indicator of {xi} and {y (i)}. When {xi} and {y (i)} are close to the overall, PJ () will be small. Now we have seen the pairing (xi, yi), the corresponding arrangement is the Identity arrangement 0, 0 = = 到 0 (i) = i, so we observed the verification statistics is PJ ( 0). To evaluate whether the virtual hypothesis is reasonable, consider p value: pj = # {: pj () PJ (0)} / 32! .
Under the virtual hypothesis, because each (pair) opportunity is the same, there are 32 (xi, yi), so there is a total of 32-step pairs, and the symbol is 32! That is, there are 32 × 31 × ... × 1 so many possibilities. Next, look at how much the statistic P () is smaller than those observed statistic P (0), this ratio is what we call P value. The P value is described under virtual hypothesis that the verification statistic will equal the ratio of the actual observed value that extreme or more extreme. Under no special arrangement, each is the same, so PJ (0) should not be too extreme, so the P value should not be too small, the p value is smaller, the more opportunities for virtual assumptions are also smaller. But how much is it called? The value of general statistics is 0.05, that is, when P is less than 0.05, this virtual assumption is not accepted. In this case, the statistically said that this verification is "Significant". In the previous Bible example, finding the associated P value is a fairly difficult calculation because 32! It is a quite a large value. The third author Rosenberger is mainly responsible for calculation, he has designed a method of calculating these verification statistics. Although these verification is called "random verification", because it involves the arrangement, it is also known as "Permutation Test). Unless the verification can be chemical into a relatively simple form, all arrangement calculations are time-consuming, so they are all calculated by the computer. He calculated: P1 = 5 × 10-4 = 0.0005P25 × 10-6 = 0.000005 These numbers are far less than 0.05, so from statistics, the verification is remarkable, and the virtual assumption is unacceptable. So they got a conclusion that ELSs are close to each other, not because of "good luck". (3) The discussion of these discussions is very academic, but our story is just beginning! In fact, this article was delivered to the US Academy of the American Academy of Sciences in 1987, one of which handed Persi Diaconis. When Diaconis is young, it is a famous magician. Now it is a statistician of Harvard University. At earlier (1986), he contacted three authors, it was possible to be a scientist who mentioned in the article. In biological research, it is often necessary to do control experiments. For a simple example, the cold will heal, but some people will not take medicine will be good. How do you verify that the drug is really effective? People who usually find two groups of colds, a group of medicine, a group of not taking medicine, or to avoid the influence of psychological factors, and give them "placebo", "placebo", then compare, see It is better to see if you take medicine. And this proposal also asked them to find a "placebo", so they find "War and Peace" as a control. This book is written by Russian Hao Tharta, and there is a translation of Hebrew, but because it is written in Russian writing, you can do "placebo". For the first part of the book, the word number is the same as "Genesis".
As a result, it was found that the control is under the same verification, which is not significant, that is, its P value is greater than 0.05. This is relatively strengthened that "ELS is similar, not a good luck" - however, the Message of the American Academy of Sciences still refuses this submission, so they will change to Statistical Science. Statistical Science found three reviewers, generally speaking people two, but this topic is too strange! It is very confused, especially the creation of
In addition, this advertisement and this book referred to that the method of revealing the password is recognized by the journal, especially the journal with the same audit. In fact, Zhuo Shining also asked for many mathematicians, and he said that every mathematician feels that all of this has existed the password. However, Zhu Zi Ning is even more powerful, and it is said that after "Genesis", there is a password, and after the fate of human beings, it will then say in the "Moses Five" (that is, the top five volumes of the Old Testament:
The mathematician has turned out the Ramsey theorem. The complete narrative of this theorem is quite inquiry. Abstract is difficult to understand, but fortunately, there is a famous mathematician Ai Dizhen (Paul Erd to steal) [Note 4], I like to use the so-called "Banquet Issues" to explain. The so-called "banquet problem" is to say, if there are six people in a banquet, is there any three people who know each other, or a phenomenon that does not know each other? This answer is affirmative. Everything is known or completely does not know, it is a structure. When the number is more and more, many strange strange structures will appear. Just like a star full night sky, you will see a lot of constellations. Therefore, this theorem gives us a lesson, as saidodore S. Motzkin: "The complete uncertain order is impossible." But this is just inspiration, explaining like
Wow! This is troublesome, it seems that there is a password everywhere, is it a living around? It is waiting for us to use the computer to interpret it? This Makai is a very interesting person. He said that Christians have been looking for a password, but they want to find a message about Jesus Christ; then, then we will try it! And this is what he uses
The formal refutes have evolved here, Zhuosi Ning seems to be slightly spoiled, but this matter is not completely solved, the reason is that the original Weitzten et al. "Isometric alphabet sequence in the Bible" is not directly Overside. Because these three people are indeed very careful in designing their experiments, and they are very careful and carefully analyzed; and they also think that Zhuosi is too loose, and some statistics are not significant. So I want to refute them, I must make a reason, indicating that their practices have problems, otherwise they use those charts or Ramcy theorem, I am afraid there is no way to let people feel orally; Pusi has always said that only the Bible password in
(6) TriaL Design. (7) Registration and randomization of patients in patients. (8) Patient Consent. (9) Required Size of Study. (10) Monitoring of trial prograss. (11) Treatment of tables and data (Forms and Data Handling). (12) Protocol Deviations. (13) Statistical analysis of Plans for StatiStical Analysis. (14) Administrative Responsibilities. Several items related to password issues are selected below, slightly explained. First of all, of course, what is the background and purpose of the experiment. The main purpose of Wei Tten and others is to prove that God has a password in the
Due to random arrangements, the patient may therefore have no medicine, so it is necessary to let the patient agree to the whole process. Also, how many patients need such experiments, is also a very interesting issue. For example, Wei Tten's experiment has chosen 32 Rabi, which is not enough? Is it possible to prove the same conclusion? Or for the whole, you must choose people in the whole encyclopedia? This is worth thinking that the form and data processing look into an eye, it is actually very important. For example, many forms often have to fill in the birth year, month, day, and the data in the paper is only the month and day of birth, which does not include the year, and should be particularly careful when handling such data. In addition, when the experiment is deviated from the protocol, for example, the patient should come in will not come in, what should I do when I need a sample? Things such as this are clear in the protocol. Article 13 How to do statistical analysis, this item is clear, not to say more. Finally, the question is responsible. In other words, this is a 14 item, in fact, there is only one purpose, that is, all experiments should be processed under strict specifications, otherwise it is likely to come out. (2) Tips After understanding the experimental design, go back to see Makai's criticism: First, Wei Tten and others use statistical methods, if a small part of the data is slightly changed, it will be very sensitive. Second, the biggest trouble is in Rabbi, and how its spell is selected. Take our current president as an example, you can call him Chen Shui-bian, Chen President, Mr. Chen Shui-fang or A-Bian, and even all kinds of alias, which one is to choose? In the Western society, there are abbreviated problems! The Rabbi analyzed by Wei Tten experiment is a list prepared according to a professor named HAVLIN. But another student M.Cohen, a scholar M.Cohen, said that this tissue is not scientific, completely inconsistent, and is a random result. He also prepared a list. But the other scholars believe that these two points are "the same", "It seems that the name is part of the name, and the careful scrutiny is a big problem, let alone Jewish day There are also a variety of different speeches, just as we have in January, the first month and the jikue. Therefore, in the protocol, the provisions such as such provisions must be formulated in advance, otherwise there is a large telescopic space; once there is a telescopic space, there are many explanations, often can't control it. But it is also possible to make a special same, reach the same result. Therefore, the next step is to ask, if there is such a freedom to play, what is the consequence of it? Ma Kai and others were applied to the "War and Peace" version of the "War and Peace", and the result of the data obtained is P <0.05, in other words, "war and peace" There is no significant result, there is a significant result. Come, in the "Genesis" experiment, why is it right? Is it too excessive playing? Ma Kai and others think that it is, and they also tested a lot of small changes, such as adding birth year, using others, etc., it is found that most of the results become weak, some become less significant Some of them are not even significant. Various phenomena, seem to point to the author's choice of data, have a fixed preference, like to pick some special Rabi, to get this result. Ma Kai even said that Wei Tten did they actually made some "tuning".
Another statement of this phenomenon is "Statistical expectations of intuition." It means that when you know what a phenomenon is what is the theoretical result, the experimental results are often doing this; because there is such a psychological tendency, it will have some conscious or unconscious "adjustment" behavior. . Therefore, it is too perfect, it is too perfect, it must be particularly careful. The events of this class have also happened in the statistical industry, where the most famous is the suspicion of statistical scholars and generator Fisher's data of Mendel. Fisher even said that Mendel may adjust the data in theory, the original data should not be so beautiful. But fortunately, the final Monndel's theory is right. This means that even if the data is really manufactured, the result is not wrong; but the results of the experiment are so good, and it will always doubt that these data is passive. Therefore, another talk method is adjusted, it is called "hands-on". However, Fei Xue's suspicion is its theoretical basis, because this perfect result indicates that its result is not allowing the reasonable error of sampling. In fact, each sample corresponds to a statistic, usually different sample statistics, which are not exactly the same. Just like using a telescope to measure the distance in the sky, measure the number of times, even if we strive to adjust the instrument, there will be some undulations. This kind of upsulf is caused by sampling errors, and some people are attributed to generalized noise (noise). The real measure is inevitably doped with noise, and there is noise data, and the corresponding verification P value should not be too small. Wei Tten's P value is small to 10-6 (one million), so people have some questions about their data. (3) Finally, in the end, Ma Kai and others have been criticized from the perspective of history. Due to the current version of the Bible, it is not a day. Like Mencius, Laozi, these books are all circulating, and the creation begins with two or three thousand years ago. In 1947 to 1951, "Dead Sea Ancient Volume" found in the northwest end of the Dead Sea, it is written in the sheepskin, a quite ancient š, is likely to be the oldest Bible book. The book is quite complete, there are many
This is the so-called, with the method to cooperate with the data, although the data is objective, the method is to produce a specific effect. Ma Kai they said that this article is not like this, it is the selection of Rabi, thus adjusting the data to cooperate with this verification. As is the example of Wang Yongqing and the author, I changed Wang Yongqing into a person who was poor than him, replacing the author with a person who is rich than the author, so that the income between the two is not big, then use The average value will be a representative, naturally it is in mind. The second conclusion is a summary of the full article. They believe that there is no evidence that there is a way to find a password from the ELS. The name of the Rabbi is close to the birthday pairing arrangement, and is purely transported. Editor-in-chi Cas also responded to this, he was called before the article of Ma Kai and others: "... Just as the conclusion of them, this puzza is really solved." STATISTICAL SCIENCE seems to be interested in this On the rest of the battle, don't want to argue. If you have learned a computer or statistically, you have heard a noun, namely Data Mining, that is, to the DATA to mining, so someone translates it into a "information exploration" [Note 6]. What mine wants to do? It is in a huge data to find out its regularity. For example, if you enter the supermarket, you will know which products will be known. Inout, customers will be more need, and then you can get more products in this way; In a huge data, understand the regularity of customer consumption, you can try to draw an efficient marketing technique, which is the meaning of information exploration. However, the data of the information exploration processing is usually quite large, and it is absolutely much more than the example items encountered during the general application. Especially in the one day of the bank, the number is quite amazing, so it doesn't have a computer processing. So many software companies, see this business opportunity, start selling a package of information exploring, which is especially careful. In the example of "Bible Password", although it has a relatively large data, there is also a way to find a very regular thing, but isn't it true? It is worth thinking. So when you are busy "explore", you may wish to learn its positive meaning, but also be careful, what do you take is Jinsha? Or is it stone? Is it the found statistician asked? Note 1. Sparta in the first five centuries of the BC has led to a military message with a codon. It is also a way to take an equidistant alphabetic sequence. See the reference data 4.2. This is the Raisan with him. Long workers "and the women's words are saying. Jacarn said the two daughters of the Raptong for his wife, and later, because of it, lend his wife and children to escape, and chased it on the way. The SONS in the article is not currently commonly used - son, but another meaning - descendants. Here is the grandson of the Raptan, and Daughters refers to his two daughters. 3. Hebrew is written by right orientation, and this article is convenient to explain the way to the right way. The original writing Hebrew only has a melon letter, and the letter of the vowel is later developed. Because of reading, it is necessary to make up the vowel, which may also cause disciplinary disciples. For the introduction of the Bible Hebrew, you can see the reference data 8.4. About the life of Ramsi and Ai Deshan, you can see the reference data 3.5. Conventional discussion of experimental design, you can see the reference data 2.6 The huge data is the product of modern electronics, computer and database skills. There have been many of the human genome and astronomical data, and people in these areas are also familiar with "information exploration".
Reference data 1.Michael Dorsnin, Dumer translation (1997), "Bible Password", Big Culture Publishing Company. 2. David S. Moore, Zheng Wei-thick translation (1999), "statistics, let the numbers talk! "The world is from the publishing company. 3. Bruce Schechter, Zeng Lan Translation (1999), "Not only a little crazy - genius Mathematician Ai Decheng Legend", presented the Press. 4. Simon Singh, Liu Yanfen Translation (2000), "Code Book", Taiwan Business Publishing. 5. Bar-Hillel, M., Bar-Natan, D. And McKay, BD (1998). Torah Codes: Puzzle and Solution. Chance 11, 13-19.6. Kass, R. (1994). Editor's Remark ON "Equidistantantantantantantantantantantant Letters Sequences in The Book of Genesis. "STATIST. SCI. 9, 306.7. Kass, R. (1999). Introdution to" Solving the Bible Code Puzzle "by Brendan Mckay, Dror Bar-Natan, Maya Bar-Hillel And Gil Kalai SCI. 14, 149.8.Kittel, BP, Hoffer, V. And Wright, RA (1989). BIBLICAL Hebrew: a Text and Workbook. Yale University Press, New Haven.9. McKay, BAR-Natan, D. Bar-Hillel, M. And Kalai, G. (1999). Soft The Bible Code Puzzle. Statist. SCI. 14, 150-173.10. Pocock, SJ (1984) Clinical Trials: a Practical Approach. 1984, Wiley & SONS, NY11. Witztum, D. Rips, E. and Rosenberg, Y. (1994). Equidistant letters sequences in the book of getters. Statist. Sci. 9, 429-439. (This article is taken from "Science and Monthly") ChUTIUM Scanned school