Is there a password in the Bible? Excerpted from Taiwan Authoritative Journal "Science Monthly"

zhaozj2021-02-17  54

Is there a password in the Bible?

on

For future words, if someone or some things can expose their mystery, they will definitely cause sensation in society. The most important in China's predephones, the people's population, it is more than 13 more than a thousand years ago, Yuan Tianzhu and Li Wei together, the "push map" in the Dynasty, and the books in the book, respectively, the Tang Dynasty National Fun Dynasties. "Mushing Diagram" and other prophecy (such as: Recording Zhu Yuanzhang and Liu Bowen) have a characteristic, it is to explain the space elasticity is quite large, and the future generation can be related to the history already. Text and graphics make sense to annotate, so often the impression of the words. Therefore, every dynasty is listed as a ban on the book, but this is not the principal of the predecessor, but is afraid of rumors and four pass, people's hearts, there is a possibility of danger. So do you have some hidden predictions, can you use a scientific way to find and verify it? How does statistics prove that the Bible has a password? In August 1994, WeittenTum; Physics Professor), Less (D. Rips; Mathematics Professor) and Rosenberg (Y. Rosenberg; Expertise Calculated) in Cas (Re Kass; Carnegie University Statistics Professor and the Department of Journals, STATISTICAL Science, published a papers named "EquidistLetter Sequences in the Book of Genesis" in the Bible in Genesis. This article uses statistical methods to prove that the Bible hides many messages, and these messages are intentionally arranged, and it is absolutely arranging in writing. And the "Bible has a password", which is also officially launched. Statistical Science is one of the official Journal of Institute of Mathematical Statistics, and the Annals of Statistics, The Annals of Probability and The Annals of Applied Probability are all three international journals, and every article published is very strict. Review, so conclusions are quite reliable. (1) What is the equidistant alphabet sequence called "Equidistant Letter Sequence, Abbreviation ELS) [Note 1]? Physician Toms (King James Version) Chapter 31: And Hast Not Suffered Me To Kiss My Sons and My Daughters? Thou hast now done foolishly in so doing (translation:! they can not kiss my sons and my daughters, you have done is really ignorance). [Note 2] remove the spaces and punctuation, merged into a string: AndhastnotsufferedmetokissmysonsandmydaughtersThouhastnowdonefoolishlyinsodoing then from " Daughters "The R begins, skip the three letters, come to" THOU "O; skip the equal distance from three letters, come to" Hast "S, and so on. The result was obtained by Roswell (Rhodeswell).

If you start from "THOU", skip 11 letters, get f; skip the isometric 11 letters to get o. As a result, UFO (UFO) and Roswell are also hidden in this paragraph. Some people may be inferred that the Bible has long been indicated that aliens will come in the desert in Rhodes, New Mexico, USA. This example is very interesting, but the Bible is the original use of Hebrew [Note 3], not English. If you want to explore whether the Bible is really hidden, Wei Tten has considers to return to the Bible's most primitive writing version, so it adopts the "written by Hebrew. The first thing they did, just like just the same, take the space, arranged a total of 78,064 words, called g, g = g1 ... GR, G1 represents the first word, And GR is seized 78,064 words. Then they define what is "equidistant alphabet": First take a plurality D, called "Yue Pitch", in the front Tomas case, the first D is 4, the second D is 12; Come back the length of the typography K, just in the example, the first K = 7, the second k = 3. These sorted these: GNGN D ... GN (K-1) D1N, N (K-1) Dr, where GN is starting point (START), N can be less than R, length K, jump There is no special limit from D D; whether it is meaningful to form the word, it is another thing. This will make up all equidistant alphabet sequences. The equidistant alphabet is a Jewish priest called Wei Sandel (Rabbi, Division, so that the Jewish priest is Rabbi), and it is possible to be an earlier Rabi, put the sheepskin paper. When the pillar is read, the string of direct reading or oblique reading occurs, sometimes there is special meaning, and this string is ELS. But how to find a non-ordinary hidden message from ELS? To this end, they have made an experiment, from the "Encyclopedia of Great Man In Israel", find 32-bit Rabi, write down their name xi (this book records in Rabby life At the end of the 9th to the 18th century, there was a thousand years from the era of "Genesis>", and the date of birth death was yi. Because there is no Arabic number in Hebrew, it is used to express numbers in letters. So just string, you can also use these dates. Then, this two-dimensional string (Xi, yi) defines a distance C (Xi, Yi) (defined method is too detail, not detailed here, interested people can take a look at the relevant papers). It was found that the number of alphabetic sequences, the name of each Rabbi, is very close to his birthday month, just like the Roswell who has seen it is also very close (it is in the same line); therefore They feel that there is a special meaning, which is never luck, coincident.

And this idea is the most interesting place! One thing to be confirmed is: Can these names and date of birth? Because if it is confused, it is far from the defined distance. If it is not too big, it means that the result is accidentally happening; if there is a significant difference, it means that this is not purely luck to explain. So they facilitate the method of statistical tests to see if such pairs are "purely accidental". (2) Statistics, you must first introduce a simple statistical concept. In the statistics, the problem of processing "accident" is to confirm that it is not a random pair, and the corresponding statistical method is called "random test". Generally, when doing statistical verification, you will first set a virtual hypothesis, which is a hypothesis that wants to overthrow it. The virtual assumption in this question is "The name and date of birth are randomly appeared, no special arrangements". This is a basic hypothesis that use terminology is a pairing arrangement method, the probability is the same. At this time, it becomes a statistical problem, and must be verified that it should refuse or accept this virtual assumption. In terms of statistics, the size of the statistic is used as a guidelines that accept the "verification". Therefore, Wei Tten first defined four verification statistics. The following only two "simplified" forms: P1 () =, p2 () = z / i! Where z = c (xi, y (i)), m = # {i: c (xi, y (i))  0.2} The} is from {1, ..., 32}. One of themselves "one-to-one functions". ( (1), ...,  (32)) is an arrangement of the number of (1, ..., 32) to rearrange the position. If we replace the birthday of the i-bit (i), the distance is changed from C (xi, yi) into C (Xi, Y (i)). N is all possible pairs, namely n = 32! . The statistical significance of the statistic P1 follows P2 is generally understood to be a similar indicator of {xi} and {y (i)}. When {xi} and {y (i)} are close to the overall, PJ () will be small. Now we have seen the pairing (xi, yi), the corresponding arrangement is the Identity arrangement  0, 0 = = 到   0 (i) = i, so we observed the verification statistics is PJ ( 0). To evaluate whether the virtual hypothesis is reasonable, consider p value: pj = # {: pj () PJ (0)} / 32! .

Under the virtual hypothesis, because each  (pair) opportunity is the same, there are 32 (xi, yi), so there is a total of 32-step pairs, and the symbol is 32! That is, there are 32 × 31 × ... × 1 so many possibilities. Next, look at how much the statistic P () is smaller than those observed statistic P (0), this ratio is what we call P value. The P value is described under virtual hypothesis that the verification statistic will equal the ratio of the actual observed value that extreme or more extreme. Under no special arrangement, each  is the same, so PJ (0) should not be too extreme, so the P value should not be too small, the p value is smaller, the more opportunities for virtual assumptions are also smaller. But how much is it called? The value of general statistics is 0.05, that is, when P is less than 0.05, this virtual assumption is not accepted. In this case, the statistically said that this verification is "Significant". In the previous Bible example, finding the associated P value is a fairly difficult calculation because 32! It is a quite a large value. The third author Rosenberger is mainly responsible for calculation, he has designed a method of calculating these verification statistics. Although these verification is called "random verification", because it involves the arrangement, it is also known as "Permutation Test). Unless the verification can be chemical into a relatively simple form, all arrangement calculations are time-consuming, so they are all calculated by the computer. He calculated: P1 = 5 × 10-4 = 0.0005P25 × 10-6 = 0.000005 These numbers are far less than 0.05, so from statistics, the verification is remarkable, and the virtual assumption is unacceptable. So they got a conclusion that ELSs are close to each other, not because of "good luck". (3) The discussion of these discussions is very academic, but our story is just beginning! In fact, this article was delivered to the US Academy of the American Academy of Sciences in 1987, one of which handed Persi Diaconis. When Diaconis is young, it is a famous magician. Now it is a statistician of Harvard University. At earlier (1986), he contacted three authors, it was possible to be a scientist who mentioned in the article. In biological research, it is often necessary to do control experiments. For a simple example, the cold will heal, but some people will not take medicine will be good. How do you verify that the drug is really effective? People who usually find two groups of colds, a group of medicine, a group of not taking medicine, or to avoid the influence of psychological factors, and give them "placebo", "placebo", then compare, see It is better to see if you take medicine. And this proposal also asked them to find a "placebo", so they find "War and Peace" as a control. This book is written by Russian Hao Tharta, and there is a translation of Hebrew, but because it is written in Russian writing, you can do "placebo". For the first part of the book, the word number is the same as "Genesis".

As a result, it was found that the control is under the same verification, which is not significant, that is, its P value is greater than 0.05. This is relatively strengthened that "ELS is similar, not a good luck" - however, the Message of the American Academy of Sciences still refuses this submission, so they will change to Statistical Science. Statistical Science found three reviewers, generally speaking people two, but this topic is too strange! It is very confused, especially the creation of has been separated for more than 3,000 years. He did not mention other things. Now it is not very strange to discover it with modern things. ? So is it careful! So these reviewers have also researched it to see if the author's statistical method is reasonable? Then check their calculations. The final conclusion is that although there is a little going, it is still the effect. That is, the significance is not significant, still constant. Therefore, STATISTICAL SCIENCE's main Casper accepts this article, and in the editor, this is left to the reader as a challenging puzzle, I hope the reader can go to solve. And this puzzle has never been interested in the world before the next incident. However, in the author's position, since 1994 to 1997, no one commented, they naturally thought that the ideas and conclusions were already accepted. This is our prelude, that is, the beginning of the story. The Bible Password The second scene, "Bible Password" appears. If you pay attention to it, the conclusion of just those authors is very neutral, just say that ELS is close, not because of good luck; but it does not tell us, what is produced by something. Since the author has a religious background, it is a traditional Jewish, and of course, it is a conclusion of religion. However, in the case where the virtual assumption is not accepted, if another hypothesis (opposite assumption) is not written, the virtual hypothesis is not correct, but what is right, still not very certain. Therefore, "return to God" is only one of the way. However, for religious beliefs, when he wrote such an article, I am afraid that there is such a counter-assault! (1) The password appears that the next story is to jump to May 28, 1997, "New York Times" logs a full page advertising, advertising is a book, the title is called the Bible Code, that is, "Bible Password". The author of this book is called Zhu Zhiben, which is the "Washington Post" and "Wall Street Journal". He spent five years of Kung Fu survey, and then he wrote this book. This book's advertising and the content of the book are roughly like this: the password hidden in the Bible has not been solved by the computer for 3,000 years, and it is now unlocked by the computer, and it can preunize everything. The author Zhuosing said, according to this password, Israeli Prime Minister Labin's name and assassination; and in fact, he wrote a letter to Labin in September 1994, telling him this possibility, but Labin did not pay attention to him, and then in November 1995, Labin died of the assassin. This is the most sensational thing in this book, and the author can't wait, open the bright, in the first chapter, it will mention this, because this is the incident he personally experienced, it is solved by himself Password, pre-knowledge.

In addition, this advertisement and this book referred to that the method of revealing the password is recognized by the journal, especially the journal with the same audit. In fact, Zhuo Shining also asked for many mathematicians, and he said that every mathematician feels that all of this has existed the password. However, Zhu Zi Ning is even more powerful, and it is said that after "Genesis", there is a password, and after the fate of human beings, it will then say in the "Moses Five" (that is, the top five volumes of the Old Testament: , <出 及 记>, , He found that there is a Bible password, and the message conveyed in addition to Rabin is assassinated, including The two presidents of American Ganzi and Lincoln, and the incident of Indian Prime Minister Gandhi, Japanese Kobe, the big earthquake in San Francisco, USA, the end of the world and the Hiroshima atomic bomb, all kinds of past and future incidents. And these venues can actually be said to be the history of the Jewish nation, records God's creation, Adam and Eve, and the story of Noah's Ark; Describe the early Jews settle in Egypt, and how Moses Egyptian law, then lead the people to leave Egypt; "Levites" is the way to Moses to the desert of Sinai, how does Israeli tribe are unmanned by him; Reprinted Israeli in the desert of the Israel And the history of the first to Palestine; describes how Moses will pass the regime to Joshua. And many people may be particularly interested in . (2) The password is played back to the Bible password. It is even more surprising that Zhuosi Ning also found the password in the Old Testament> Inside the Old Testament> A well-known phenomenon is that once someone promotes a phenomenon, everyone will be promoted. So, people who believe in Christian are also looking for it, see if the new approximation is also hidden. As a result, not only the people who believe in Jewish or Christianity are looking for the "Bible Password". People who believe in the Muslim are also looking for, and the whole thing will preach, especially in the "New York Times" published. Plus these people hear, pre-knowledge, the news value is very high. So CNN, "New York Times", "Time Magazine", "News Week" is specifically introduced, and then even the general "offshore show", such as Today Show and Oprah Show have also related topics . Once you have such a big sensation in the United States, many language translations will appear. Taiwan's "Bible Password" is translated by Mr. Dumer. In addition to the bestsellers in multiple languages, the "Bible Password" related products will soon appear. The first is the book about other hidden messages, as well as the new password book, then the TV documentary, even the movie also shoots, and if you want to "decrypt the code, there are also commercial software. If you are interested, you can also go to the website, type "Bible Code" to search, soon there is a large string related project items, including various arguments, the solution of religious groups ... Waiting, obviously "Bible Password" Things have caused the whole world. (3) The debut of such a sensation is naturally caused by such a sensation. As mentioned earlier, the virtual assumption is not established, and it is indeed "there is something existed", but this thing is a password? Is there any other reason to cause this phenomenon? Then come to see how the mathematician explains.

The mathematician has turned out the Ramsey theorem. The complete narrative of this theorem is quite inquiry. Abstract is difficult to understand, but fortunately, there is a famous mathematician Ai Dizhen (Paul Erd to steal) [Note 4], I like to use the so-called "Banquet Issues" to explain. The so-called "banquet problem" is to say, if there are six people in a banquet, is there any three people who know each other, or a phenomenon that does not know each other? This answer is affirmative. Everything is known or completely does not know, it is a structure. When the number is more and more, many strange strange structures will appear. Just like a star full night sky, you will see a lot of constellations. Therefore, this theorem gives us a lesson, as saidodore S. Motzkin: "The complete uncertain order is impossible." But this is just inspiration, explaining like The number of words is huge, there is a password: but for the original problem, this has not proved too many things, and it is not what we want. On the other hand, the three authors of the original papers, the Math Professor of Hebrew University, believes that future incidents are unlikely to predict, and they think that Zhuosing is a little translation. The cryptography of the solution is not significant in statistical, that is, the corresponding P value is not less than 0.05. Zhu Zi Ning visited the Hetus several times before and after writing, did not expect that they were in the first step when they were in the face of criticism, and they were not exactly the same. There are also many people to find that Zhuosi Ning uses the method and the method of equidistant sequence. It is quite not strict. Many people (for example, we mentioned in Tom Mas) use the same way, it is easy to find that there is a password everywhere, just like the British Wang Qin's version of the Bible, you can find UFO, this is the whole suspicion Out. And how to respond to these criticisms, how to respond? In the "news weekly", he said: "If my critics can find a prime minister's password message in" Moby Dick "(Moby Dick), I will believe them. "This is a challenge for critics! When this war is here, it is already quite hot. AUSTRALIA National University, a computer professor, Brendan Mckay, accepts this challenge, found the "message" (Figure 3) of the Indian Prime Minister Gandhi, and put it on your own website . The Igandhi directly in Figure 3, the first i is his name Indira's abbreviation, followed by Gandhi. Then, it is the BLOODY DEED, the death contract, indicating that Gandhi will be killed. In fact, Ma Kai did not only find a prime minister, he was still in "White Whale", found Abraham Lincoln (Lincoln), Lincol, Gan Xi ... and other celebrities were assassinated, using the same way as Zhuo .

Wow! This is troublesome, it seems that there is a password everywhere, is it a living around? It is waiting for us to use the computer to interpret it? This Makai is a very interesting person. He said that Christians have been looking for a password, but they want to find a message about Jesus Christ; then, then we will try it! And this is what he uses , because Zhuosing mentioned this in the Bible Password, this is a "Seal Book", previewing the "Day of Messia", and Jesus always It is considered as Messiah. Ma Kai considers some keywords in accordance with Wei Tten et al., Like Son of God, analyzes that Jesus is close to Son of Man. The Jesus of Jesus became "people" from "the son of God", and the entire battle has also become chaos, and the situation is unknown. Note 1. Sparta in the first five centuries of the BC has led to a military message with a codon. It is also a way to take an equidistant alphabetic sequence. See the reference data 4.2. This is the Raisan with him. Long workers "and the women's words are saying. Jacarn said the two daughters of the Raptong for his wife, and later, because of it, lend his wife and children to escape, and chased it on the way. The SONS in the article is not currently commonly used - son, but another meaning - descendants. Here is the grandson of the Raptan, and Daughters refers to his two daughters. 3. Hebrew is written by right orientation, and this article is convenient to explain the way to the right way. The original writing Hebrew only has a melon letter, and the letter of the vowel is later developed. Because of reading, it is necessary to make up the vowel, which may also cause disciplinary disciples. Introduction to the Bible Hebrew, you can see the reference data 8.4. About the life of Ramsi and Ai Disan, you can see the reference data 3. under

The formal refutes have evolved here, Zhuosi Ning seems to be slightly spoiled, but this matter is not completely solved, the reason is that the original Weitzten et al. "Isometric alphabet sequence in the Bible" is not directly Overside. Because these three people are indeed very careful in designing their experiments, and they are very careful and carefully analyzed; and they also think that Zhuosi is too loose, and some statistics are not significant. So I want to refute them, I must make a reason, indicating that their practices have problems, otherwise they use those charts or Ramcy theorem, I am afraid there is no way to let people feel orally; Pusi has always said that only the Bible password in , wants to refute this, it is necessary to return to the original article. The journal articles that have been reviewed, or by the journal articles, and it is best to refute the article of the same journal. There is a credibility and persuasion. In 1998, Ma Kai and two Hebrew University scholars, Bar-Hillel, Bar-Natan, first in a popular statistical journal Chance, for Wei Tten et al. The refutation, there is no too many technical (statistics), but describes the end of the incident, the attack words are fierce, and claim that the Hebrew version of "War and Peace" can also discover password, this is also Weiz Contrary to the thesis of Teng and others. Then, in 1999, Ma Kai and other trips were coupled with the Mathematics professor of Hebrew University, published an academic article in Statistical Science: (Solving the Bible Code Puzzle), A statistical basis is provided for Chance's articles. In this article, they said that Wei Tten et al. Published in 1994 had considerable defects, especially the design and data collection of the experiment. What is the problem? At this time, you will have to look back and see what requirements in the statistics. (1) When discussing experimental design and discussing experimental design, it will usually mention that the industrial experiment design of the best production formula, and find a drug test design for new drugs. Regarding the latter, due to the experience of clinical experiments in the past few decades, the academic and medical communities have set a quite strict standards, and these standards are written in the Protocol. First of all, we must know that doing medical experiments, or before the drug factory test new drugs, it must be written first, and must begin after approval of the Protocol. Usually, what is the purpose of the experiment must be written in the protocol, what is the entire design, and how to do it. The fourteen items listed below are S. J.Pocok, listed in the Clinical Trials: (1) Background and General AIMS. (2) Specific Objectives. (3) Select the patient's standard (Patient Selection Criteria). (4) Treatment schedules. (5) Method of Patient Evaluation.

(6) TriaL Design. (7) Registration and randomization of patients in patients. (8) Patient Consent. (9) Required Size of Study. (10) Monitoring of trial prograss. (11) Treatment of tables and data (Forms and Data Handling). (12) Protocol Deviations. (13) Statistical analysis of Plans for StatiStical Analysis. (14) Administrative Responsibilities. Several items related to password issues are selected below, slightly explained. First of all, of course, what is the background and purpose of the experiment. The main purpose of Wei Tten and others is to prove that God has a password in the . The special purpose of the paper is to prove that the name of the Rabbi is very close to its birthday, not an accidental event. Second, several of the patient's processing, wherein the patient's choice corresponds to the selection of the Trickby. What is Wei Tten and others use what standards use these Rabi? This involves many things, including the spelling of the Rabbi name, how to estimate the distance mentioned earlier, where the details are left behind. In the medical experiment, if the patient is wonderful, if there is a lot of complications, then even if the medicine is reunited, the effect is not very good; but if the patient's condition is very slight, it seems very strong. Then the "medicine to disease" and "no medicine" are likely. Therefore, the selection of patients and Rabi will directly affect all analytical results. Then I will discuss the design of the test, and how this is related to the experiment. For example, Wei Tten is carried out through a method of pairing and controlled experiments. The control experiment is a comparative experiment. In addition to processing factors (such as pharmacological or God indicates), other factors that may affect the results of the experiment must be controlled. Therefore, Wei Tten is used to use the "War and Peace" to use Hebrew text, and the number of words is as much as possible, that is, this purpose. In addition, some people may hear "Double Blind Design", mainly, if they want to experiment with two possible drugs (of course, including placebo), then in addition to the patient itself, I don't know what medicine he eat, In addition to the psychological effects, even doctors don't know if the patient takes place in placebo, so as to avoid the doctor because the patient "has a medicine" pretreatment, the diagnosis does not consciously judge, think that the patient will become Better. Therefore, the main purpose of double-blind (or double-shaped) is also required to avoid human prejudice as much as possible in the experiment. In the order of the patient, such as the single taking medicine, dual number of placebo, etc., it is also possible to produce this unconscious prejudice [Note 5], so it is necessary to disrupine the production of medicine (random), Make it not in a fixed mode.

Due to random arrangements, the patient may therefore have no medicine, so it is necessary to let the patient agree to the whole process. Also, how many patients need such experiments, is also a very interesting issue. For example, Wei Tten's experiment has chosen 32 Rabi, which is not enough? Is it possible to prove the same conclusion? Or for the whole, you must choose people in the whole encyclopedia? This is worth thinking that the form and data processing look into an eye, it is actually very important. For example, many forms often have to fill in the birth year, month, day, and the data in the paper is only the month and day of birth, which does not include the year, and should be particularly careful when handling such data. In addition, when the experiment is deviated from the protocol, for example, the patient should come in will not come in, what should I do when I need a sample? Things such as this are clear in the protocol. Article 13 How to do statistical analysis, this item is clear, not to say more. Finally, the question is responsible. In other words, this is a 14 item, in fact, there is only one purpose, that is, all experiments should be processed under strict specifications, otherwise it is likely to come out. (2) Tips After understanding the experimental design, go back to see Makai's criticism: First, Wei Tten and others use statistical methods, if a small part of the data is slightly changed, it will be very sensitive. Second, the biggest trouble is in Rabbi, and how its spell is selected. Take our current president as an example, you can call him Chen Shui-bian, Chen President, Mr. Chen Shui-fang or A-Bian, and even all kinds of alias, which one is to choose? In the Western society, there are abbreviated problems! The Rabbi analyzed by Wei Tten experiment is a list prepared according to a professor named HAVLIN. But another student M.Cohen, a scholar M.Cohen, said that this tissue is not scientific, completely inconsistent, and is a random result. He also prepared a list. But the other scholars believe that these two points are "the same", "It seems that the name is part of the name, and the careful scrutiny is a big problem, let alone Jewish day There are also a variety of different speeches, just as we have in January, the first month and the jikue. Therefore, in the protocol, the provisions such as such provisions must be formulated in advance, otherwise there is a large telescopic space; once there is a telescopic space, there are many explanations, often can't control it. But it is also possible to make a special same, reach the same result. Therefore, the next step is to ask, if there is such a freedom to play, what is the consequence of it? Ma Kai and others were applied to the "War and Peace" version of the "War and Peace", and the result of the data obtained is P <0.05, in other words, "war and peace" There is no significant result, there is a significant result. Come, in the "Genesis" experiment, why is it right? Is it too excessive playing? Ma Kai and others think that it is, and they also tested a lot of small changes, such as adding birth year, using others, etc., it is found that most of the results become weak, some become less significant Some of them are not even significant. Various phenomena, seem to point to the author's choice of data, have a fixed preference, like to pick some special Rabi, to get this result. Ma Kai even said that Wei Tten did they actually made some "tuning".

Another statement of this phenomenon is "Statistical expectations of intuition." It means that when you know what a phenomenon is what is the theoretical result, the experimental results are often doing this; because there is such a psychological tendency, it will have some conscious or unconscious "adjustment" behavior. . Therefore, it is too perfect, it is too perfect, it must be particularly careful. The events of this class have also happened in the statistical industry, where the most famous is the suspicion of statistical scholars and generator Fisher's data of Mendel. Fisher even said that Mendel may adjust the data in theory, the original data should not be so beautiful. But fortunately, the final Monndel's theory is right. This means that even if the data is really manufactured, the result is not wrong; but the results of the experiment are so good, and it will always doubt that these data is passive. Therefore, another talk method is adjusted, it is called "hands-on". However, Fei Xue's suspicion is its theoretical basis, because this perfect result indicates that its result is not allowing the reasonable error of sampling. In fact, each sample corresponds to a statistic, usually different sample statistics, which are not exactly the same. Just like using a telescope to measure the distance in the sky, measure the number of times, even if we strive to adjust the instrument, there will be some undulations. This kind of upsulf is caused by sampling errors, and some people are attributed to generalized noise (noise). The real measure is inevitably doped with noise, and there is noise data, and the corresponding verification P value should not be too small. Wei Tten's P value is small to 10-6 (one million), so people have some questions about their data. (3) Finally, in the end, Ma Kai and others have been criticized from the perspective of history. Due to the current version of the Bible, it is not a day. Like Mencius, Laozi, these books are all circulating, and the creation begins with two or three thousand years ago. In 1947 to 1951, "Dead Sea Ancient Volume" found in the northwest end of the Dead Sea, it is written in the sheepskin, a quite ancient š, is likely to be the oldest Bible book. The book is quite complete, there are many fragments, but most of the residual volume. Later, the Bible is likely to be corrected according to these restrictions, so if there is a password, this password is impossible to spread from the most primitive version. Because the scripture is circulating, it is inevitable that it will be deleted and inhaled. If the previously defined jump distance D is small, the selected ELS constant chance is very large, the password will not be deleted; D is big, as long as you delete a letter in the middle, it is no longer a complete ELS. For example, Zhuo Singer used D = 4,772 when Labne was pierced, in such a long string, to ensure that it was difficult to be inserted or deleted. Therefore, from the perspective of literature, there is no way to ensure that the password is not caused. Finally, Ma Kai took two conclusions. First, they think this article is not intentionally find a verification method to cooperate with data. That is, it is not that the data is already there, and then it is more intentional to find a way to do well. For example, if you want to use the average (method) to represent Wang Yongqing's wealth (data), then the author will certainly look very money, but the average must not represent the revenue of the author, this method is just Deliberately causing the author to have money conclusions.

This is the so-called, with the method to cooperate with the data, although the data is objective, the method is to produce a specific effect. Ma Kai they said that this article is not like this, it is the selection of Rabi, thus adjusting the data to cooperate with this verification. As is the example of Wang Yongqing and the author, I changed Wang Yongqing into a person who was poor than him, replacing the author with a person who is rich than the author, so that the income between the two is not big, then use The average value will be a representative, naturally it is in mind. The second conclusion is a summary of the full article. They believe that there is no evidence that there is a way to find a password from the ELS. The name of the Rabbi is close to the birthday pairing arrangement, and is purely transported. Editor-in-chi Cas also responded to this, he was called before the article of Ma Kai and others: "... Just as the conclusion of them, this puzza is really solved." STATISTICAL SCIENCE seems to be interested in this On the rest of the battle, don't want to argue. If you have learned a computer or statistically, you have heard a noun, namely Data Mining, that is, to the DATA to mining, so someone translates it into a "information exploration" [Note 6]. What mine wants to do? It is in a huge data to find out its regularity. For example, if you enter the supermarket, you will know which products will be known. Inout, customers will be more need, and then you can get more products in this way; In a huge data, understand the regularity of customer consumption, you can try to draw an efficient marketing technique, which is the meaning of information exploration. However, the data of the information exploration processing is usually quite large, and it is absolutely much more than the example items encountered during the general application. Especially in the one day of the bank, the number is quite amazing, so it doesn't have a computer processing. So many software companies, see this business opportunity, start selling a package of information exploring, which is especially careful. In the example of "Bible Password", although it has a relatively large data, there is also a way to find a very regular thing, but isn't it true? It is worth thinking. So when you are busy "explore", you may wish to learn its positive meaning, but also be careful, what do you take is Jinsha? Or is it stone? Is it the found statistician asked? Note 1. Sparta in the first five centuries of the BC has led to a military message with a codon. It is also a way to take an equidistant alphabetic sequence. See the reference data 4.2. This is the Raisan with him. Long workers "and the women's words are saying. Jacarn said the two daughters of the Raptong for his wife, and later, because of it, lend his wife and children to escape, and chased it on the way. The SONS in the article is not currently commonly used - son, but another meaning - descendants. Here is the grandson of the Raptan, and Daughters refers to his two daughters. 3. Hebrew is written by right orientation, and this article is convenient to explain the way to the right way. The original writing Hebrew only has a melon letter, and the letter of the vowel is later developed. Because of reading, it is necessary to make up the vowel, which may also cause disciplinary disciples. For the introduction of the Bible Hebrew, you can see the reference data 8.4. About the life of Ramsi and Ai Deshan, you can see the reference data 3.5. Conventional discussion of experimental design, you can see the reference data 2.6 The huge data is the product of modern electronics, computer and database skills. There have been many of the human genome and astronomical data, and people in these areas are also familiar with "information exploration".

Reference data 1.Michael Dorsnin, Dumer translation (1997), "Bible Password", Big Culture Publishing Company. 2. David S. Moore, Zheng Wei-thick translation (1999), "statistics, let the numbers talk! "The world is from the publishing company. 3. Bruce Schechter, Zeng Lan Translation (1999), "Not only a little crazy - genius Mathematician Ai Decheng Legend", presented the Press. 4. Simon Singh, Liu Yanfen Translation (2000), "Code Book", Taiwan Business Publishing. 5. Bar-Hillel, M., Bar-Natan, D. And McKay, BD (1998). Torah Codes: Puzzle and Solution. Chance 11, 13-19.6. Kass, R. (1994). Editor's Remark ON "Equidistantantantantantantantantantantant Letters Sequences in The Book of Genesis. "STATIST. SCI. 9, 306.7. Kass, R. (1999). Introdution to" Solving the Bible Code Puzzle "by Brendan Mckay, Dror Bar-Natan, Maya Bar-Hillel And Gil Kalai SCI. 14, 149.8.Kittel, BP, Hoffer, V. And Wright, RA (1989). BIBLICAL Hebrew: a Text and Workbook. Yale University Press, New Haven.9. McKay, BAR-Natan, D. Bar-Hillel, M. And Kalai, G. (1999). Soft The Bible Code Puzzle. Statist. SCI. 14, 150-173.10. Pocock, SJ (1984) Clinical Trials: a Practical Approach. 1984, Wiley & SONS, NY11. Witztum, D. Rips, E. and Rosenberg, Y. (1994). Equidistant letters sequences in the book of getters. Statist. Sci. 9, 429-439. (This article is taken from "Science and Monthly") ChUTIUM Scanned school

转载请注明原文地址:https://www.9cbs.com/read-30219.html

New Post(0)