Deterministic Finite Automata

Size: px
Start display at page:

Download "Deterministic Finite Automata"

Transcription

1 Deterministic Finite Automt Bkhdyr Khoussinov Computer Science Deprtment, The University of Aucklnd, New Zelnd In this lecture we introduce deterministic finite utomt, one of the foundtionl concepts in computing sciences. Finite utomt re the simplest mthemticl model of computers. Informlly, finite utomton is system tht consists of sttes nd trnsitions. Ech stte represents finite mount of informtion gthered from the strt of the system to the present moment. Trnsitions represent stte chnges descried y the system rules. Prcticl pplictions of finite utomt include digitl circuits, lnguge design nd implementtions, imge processing, modeling nd uilding relile softwre, nd theoreticl computing. 1 Strings nd lnguges Recll tht n lphet is finite set Σ of symols. In most cses, our lphets contin symols,, c, d,.... If Σ contins k letters then we sy tht Σ is k-letter lphet. A 1-letter lphet is clled unry lphet, nd 2-letter lphet is inry lphet. We will often del with the inry lphet {, }. Let Σ e n lphet. The elements of the lphet re clled input symols. A finite sequence of symols from Σ is clled string of the lphet. Sometimes strings re lso clled words. Thus, ech string is of the form σ 1 σ 2... σ n, where ech σ i is symol of the lphet. The length of given string is the numer of symols it hs. Thus, the length of strings,, nd re 4, 6, nd 2, respectively. There is specil string whose length is 0 clled the empty string. We denote this string y λ. Using mthemticl induction, it is esy to show tht the numer of strings of length n of k-letter lphet Σ is equl to k n. Let Σ e n lphet. The set of ll strings over the lphet Σ is denoted y Σ. Thus, Σ = {σ 1 σ 2... σ m σ 1, σ 2,...,σ m Σ, m N}. Note tht when m = 0, we hve the empty string λ nd therefore λ Σ. We denote the strings of the lphet y the letters u, v, w,.... Let u nd v e strings. Then the conctention of these two strings, denoted y u v, is otined y writing down u followed y v. For exmple, produces the string. It is cler tht the conctention opertion on words stisfies the equlity u (v w) = (u v) w for ll words u, v, w. Note tht λ u = u λ for ny string u. Often, insted of writing u v we my omit the dot sign nd write uv insted. Let u e string. The nottion u n represents the string otined y writing down u exctly n times. Thus, u n is the string otined y conctenting u to itself n times. For exmple, () 3 =. When n = 0 then u n is the empty string λ for ny string u.

2 Let u nd w e strings. We sy tht w is sustring of u if w occurs in u. More formlly, w is sustring of u if u = u 1 wu 2 for some strings u 1 nd u 2. For exmple, is sustring of while is not. Clerly, every string u is sustring of itself. We sy tht w is prefix of u if u cn e written s wu 1. For exmple, the prefixes of the string re λ,,,,, nd. Now we give n importnt definition: Definition 1. A lnguge is suset of Σ, where Σ is n lphet. When we use the term lnguge we lwys ssume, implicitly or explicitly, tht we re given n lphet. Here re some exmples of lnguges:, Σ, {λ,,,,,,...}, {, }, {w is sustring of w}. We denote lnguges y cpitl letters U, V, W, L, etc. We now define severl opertions on lnguges. Given two lnguges U nd V, their union is U V ; their intersection is U V ; nd the complement of U is Σ \ U. Below we discuss two dditionl opertions on lnguges. The conctention opertion. Let U nd W e lnguges. The conctention of U nd W is the lnguge: {u w u U, w W }. We denote this lnguge y U W. For exmple, if U = {, } nd W = {, } then U W = {,,, }. Here is nother exmple. Let U = {}. Then for ny lnguge L, U L = {u u L}. The str opertion. This opertion is lso often clled the Kleene s str opertor. Let U e the lnguge. Consider the following sequence of lnguges: U 0, U 1, U 2, U 3, U 4,... where U n with n N is defined recursively s follows: U 0 = {λ}, U 1 = U, U 2 = U U, nd U n = U n 1 U. We cn tke the union of ll these lnguges nd denote the resulting lnguge y U. Thus, U = U 0 U 1 U 2 U The lnguge U is clled the str of the lnguge U. More informlly, U is the set of strings otined y finite numer of conctentions pplied to strings from the lnguge U. For exmple, if U = {} then U = {λ,,,,,...}. Note tht the str of every lnguge contins λ. The lnguge U is lwys n infinite lnguge prt from the cses U = nd U = {λ}. 2 Deterministic finite utomt Let Σ e n lphet nd U e lnguge of Σ. A typicl prolem tht we wnt to solve is the following. Design n lgorithm tht, given string w, determines whether or not w is in U.

3 Here is n exmple. Let U e the lnguge consisting of ll strings w over the lphet {, } such tht w contins the sustring. We wnt to design n lgorithm tht, given string w, determines whether or not w contins sustring. Here is the Find-(w) lgorithm. Let w e the string w = σ 1... σ n. 1. Initilize vriles i nd stte of integer type s i = 1 nd stte = 0 2. While i n do () If stte = 0 nd σ i = then set stte = 0. () If stte = 0 nd σ i = then set stte = 1. (c) If stte = 1 nd σ i = then set stte = 1. (d) If stte = 1 nd σ i = then set stte = 2. (e) If stte = 2 nd σ i = then set stte = 3. (f) If stte = 2 nd σ i = then set stte = 0. (g) If stte = 3 nd σ i {, } then stte = 3. (h) Increment i y one. 3. If stte = 3 then output ccept. Otherwise output reject. The importnt fctor in this lgorithm is the vlues of the vrile stte. These vlues re re 0, 1, 2, nd 3. Cll these the sttes of the progrm. The progrm mkes its trnsitions from one stte to nother depending on the input σ i it reds. Thus, we hve trnsition function ssocited with the progrm. The tle of the trnsition function is presented in Tle Tle 1. Trnsition function for the Find-(w) The stte 0 is the initil stte of the lgorithm. The stte 3 is the ccepting stte s w contins when stte = 3. Finlly, if the lgorithm outputs reject then the stte vrile hs vlue 0, 1, or 2. Thus, we hve given finite stte nlysis of the Find-(w) lgorithm. Now we strct from this exmple nd give the following definition: Definition 2. A deterministic finite utomton is 5-tuple (S, q 0, T, F, Σ), where 1. S is the set of sttes. 2. q 0 is the initil stte nd q 0 S. 3. T is the trnsition function T : S Σ S. 4. F is suset of S clled the set of ccepting sttes. 5. Σ is n lphet.

4 We revite deterministic finite utomton s DFA. We often write (S, q 0, TF) insted of (S, q 0, T, F, Σ). We use letters A, B,... to denote finite utomt. Thus, the stte nlysis of the Find-(w) lgorithm ove gives us the utomton (S, 0, T, F), where: S = {0, 1, 2, 3}, 0 is the initil stte, T is presented in Tle 1 ove, nd F = {3}. As for trnsition functions from the previous lecture, we cn visulize finite utomt s leled grphs. Let (S, q 0, T, F) e DFA. The sttes of the DFA re represented s vertices of the grph. We put n edge from stte s to stte q if there is n input signl σ such tht T(s, σ) = q. The edges leled with σ re clled σ-trnsitions. The initil stte is presented s vertex with n ingoing rrow without source. The finl sttes re vertices tht re douly circled. We cll this visul presenttion trnsition digrm of the utomton. For exmple, the trnsition digrm of the utomton for the Find-(w) lgorithm is given in Figure Fig. 1. Trnsition digrm for DFA for the F ind-(w) lgorithm Another exmple of DFA is presented in Figure 2. Fig.2. An exmple of trnsition digrm

5 Let M = (S, q 0, T, F, Σ) e DFA. Tke ny string w = σ 1... σ n of the lphet Σ. The run of the utomton on this string is the sequence of sttes s 1, s 2,..., s n, s n+1 such tht T(s i, σ i ) = s i+1 for ll i = 1,...,n nd tht s 1 is the initil stte. Thus, the run of M on string w = σ 1...σ n cn e thought of s the execution the following lgorithm Run(M, w): 1. Initilize s = q 0 nd i = Print s. 3. While i n do () Set σ = σ i. () Set s = T(s, σ). (c) Print s. (d) Increment i This lgorithm outputs the sttes of the DFA M s it reds through the string w. First, the lgorithm prints the initil stte. It then reds the first input σ 1, mkes trnsition from the initil stte to stte T(q 0, σ 1 ) nd outputs T(q 0, σ 1 ), reds the next symol σ 2, mkes trnsition, nd so on. Note tht every run of M is pth strting from the initil stte q 0. One cn lso visulize the run s pth leled y the string w nd strting with q 0. For exmple, the pth 0, 0, 0, 1, 1, 2, 3, 3 is the run of the utomton in Figure 1 on the string. On the sme input string the utomton on Figure 1 produces the run 0, 0, 0, 1, 4, 7, 5, 2. Definition 3. Let M = (S, q 0, T, F) e DFA. We sy tht M ccepts the string w = σ 1...σ n if the run of M s 1,...,s n, s n+1 on w is such tht the lst stte s n+1 is in F. We cll such run n ccepting run. Note tht the run of M on w is lwys unique. Therefore, the run is either ccepting or rejecting ut not oth. For exmple, the utomton in Figure 1 ccepts those strings tht contin s sustring nd rejects ll other strings. The utomton in Figure 2 ccepts ll the strings tht hve in the third position from the lst nd rejects ll other strings. Thus, we now define the following importnt concept: Definition 4. Let M = (S, q 0, T, F, Σ) e DFA. The lnguge ccepted y M, denoted y L(M), is the following lnguge: {w the utomton M ccepts w}. A lnguge L Σ is DFA recognizle if there exists DFA M such tht L = L(M). Now we give severl simple exmples: 1. Consider DFA with exctly one stte. If the stte is the ccepting stte then the utomton ccepts the lnguge Σ. Otherwise, if the stte is not ccepting, the utomton ccepts the empty lnguge.

6 2. Consider the lnguge {w} consisting of one word w = σ 1... σ n. This lnguge is DFA recognizle. The utomton recognizing this lnguge just rememers the entire string. Indeed, the following DFA (S, 0, T, F) recognizes the lnguge: () S = {0, 1, 2, 3, 4,..., n + 1}. () 0 is the initil stte. (c) For ll i n 1, T(i, σ i+1 ) = i + 1. In ll other cses T(s, σ) = n + 1. (d) The ccepting stte is n. The trnsition digrm of this utomton when w = is in Figure Fig.3. A DFA recognizing the lnguge {}. 3. The lnguge L = {w w {, } } is DFA recognizle. The trnsition digrm of DFA tht recognizes the lnguge is in Figure 4. Formlly, here is the utomton M = (S, q 0, T, F) recognizing L: () S = {0, 1, 2} () The initil stte is 0. (c) The trnsition tle is defined s follows: T(s, σ) = 1 for s = 0 nd σ =, T(s, σ) = 1 for s = 1 nd σ {, }, nd T(s, σ) = 2 in ll other cses. (d) 1 is the ccepting stte Fig.4. A DFA recognizing the lnguge {w w {, } }.

7 3 Constructing finite utomt Suppose tht we re given lnguge L nd re sked to design DFA tht recognizes the lnguge L or rgue tht such DFA does not exist. A very helpful ide for solving this type of prolem is to pretend tht you re the mchine nd see how you would go out solving the prolem. We explin this in the following two exmples. Assume tht we wnt to construct DFA tht recognizes the lnguge L = {w w {} nd w contins n odd numer of s nd n even numer of s}. Let s pretend tht we re the mchine. We strt reding from left to right the input string w, nd see symols or. Do we need to rememer the entire string we hve seen so fr in order to tell whether we hve pssed through n odd numer of s nd n even numer of s? Our nswer is no ecuse of the following oservtion. We keep two coins oth hving two colored sides lue nd red. We ssocite the first coin with the symol nd the second with the symol. When we strt, oth coins re on their lue sides. Reding w, when we see we flip the first coin nd when we see we flip the second coin. Thus, if the first coin is on its lue side thn we hve seen n even numer of s, nd if the coin is on its red side then we hve seen n odd numer of s. The sme holds true for the symol. Therefore, t t ny given time, our stte is determined y the current colors of the coins. There re four possile sttes only: 1. The first coin is lue nd the coin is lue. Code this stte s The first coin is red nd the coin is lue. Code this stte s The first coin is lue nd the coin is red. Code this stte s The first coin is red nd the coin is red. Code this stte s 3. When we finish reding the whole input string w we ccept the string if the first coin is on its red side nd the second coin is in its lue side. In ll other cses we reject the string. Thus, ll this resoning helps us to uild DFA tht recognizes L. The Figure 5 is the trnsition digrm of the utomton we hve uilt Fig.5. A DFA recognizing the lnguge {w w hs n odd numer of s nd n even numer of s}.

8 Consider the following lnguge L = { n n n N}. Let s pretend to e mchine tht recognizes L. Given n input string w, we hve the following constrints s dictted y the definition of run of DFA. We must red the string w from left to right. We re not llowed to come ck to ny position in w which we hve pssed. Assume w strts with. We then reject w. Assume tht w strts with n. We red nd rememer tht we hve red one. Informlly, this tells us tht we hve to crete stte, let s denote it y s 1, tht rememers tht w strts with n. If is the next nd the lst symol then we ccept w. Otherwise, we reject w. If the second symol is, then we rememer tht we hve red two s. Informlly, this tells us tht we hve to crete stte, let s denote it y s 2, tht rememers tht w strts with. We must keep s 1 nd s 2 seprte. Indeed, if we declre s 1 = s 2 then we hve to ccept the string which is clerly not desirle. Lets continue this on. Assume tht w is of the form n u, where n 1, nd we hve creted sttes s 1, s 2,..., s n. Stte s i detects tht the input string strts with i. Consider the first symol of u. If it is then we cn use our sttes s n, s n 1,..., s 1 nd control the next n symols of w. If ll the symols of u re nd there re exctly n of them, we ccept w nd otherwise reject. However, if the first symol of u is, then we need to rememer tht we hve red exctly n + 1 symols of. This tells us tht we hve to crete stte, let s denote it y s n+1, tht rememers tht w strts with n+1. We must keep s n+1 seprte from ll the sttes s 1, s 2,..., s n we hve uilt so fr. Thus, we see tht in order to recognize L, our informl nlysis tells us tht we need to hve infinitely mny sttes. This intuitive resoning sed on pretending to e mchine for recognizing L gives us reson to elieve tht no DFA recognizes L. Indeed, our intuition here is correct s will e shown in Lecture 13. Constructing utomt for the union opertion. Here is design prolem we wnt to solve. Assume we re given two DFA M 1 = (S 1, q (1) 0, T 1, F 1 ) nd M 2 = (S 2, q (2) 0, T 2, F 2 ). These two DFA recognize lnguges L 1 = L(M 1 ) nd L 2 = L(M 2 ). We wnt to design DFA M = (S, q 0, T, F) tht recognizes the union L 1 L 2. We use the method of pretending to e mchine tht recognizes L 1 L 2. The first ttempt for uilding the desired M is this. For n input string w, we simulte the first mchine M 1. If M 1 ccepts w then w L 1 L 2. If M 1 rejects w then we run the second mchine M 2 on w. If M 2 ccepts w then w L 1 L 2. Otherwise, we reject w. The prolem with this ide is tht we cn not red the input w twice. If we re not llowed to run M 1 nd M 2 on w turn y turn then why don t we run M 1 nd M 2 on w in prllel? We tke the following pproch. On input string w, we run M 1 nd M 2 simultneously s follows. Initilly, we rememer the initil sttes q (1) 0 nd q (2) 0. We red the first input symol σ 1 of w, mke simultneous trnsitions on M 1 nd M 2, nd rememer the sttes s (1) 1 = T 1 (q (1) 0, σ 1) nd s (2) 1 = T 2 (q (2) 0, σ 1). We then repet this process y mking simultneous trnsitions from s (1) 1 to s (1) 2 = T 1 (s (1) 1, σ 2) on M 1, nd from s (2) 1 to s (2) 2 = T 2 (s (2) 1, σ 2) on M 2, where σ 2 is the second letter of w. We continue this on. Once we finish the simultneous runs of M 1 nd M 2 on w, we look t the resulting end sttes of these two runs. If one of these sttes is ccepting then we ccept w nd otherwise we reject w. Thus, t ny given stge of the two runs we rememer pir (p, q), where p S 1 nd q S 2. Our trnsition on this pir on input σ is simply the simultneous trnsitions from p to T 1 (p, σ) of M 1 nd from q to T 2 (q, σ) of M 2. We cn e in t most S 1 S 2 sttes.

9 Now we formlly define the DFA M = (S, q 0, T, F) tht recognizes the lnguge L 1 L 2 : 1. The set S of sttes is S 1 S The initil stte is the pir (q (1) 0, q(2) 0 ). 3. The trnsition function T is the product of the trnsition functions T 1 nd T 2, tht is: T((p, q), σ) = (T 1 (p, σ), T 2 (q, σ)), where p S 1, q S 2, nd σ Σ. 4. The set F of finl sttes consists of ll pirs (p, q) such tht either p F 1 or q F 2. The proof tht M is DFA recognizing the union L 1 L 2 is informlly explined s follows. We first show tht, nn the one hnd, if w is in L 1 L 2 then the utomton M ccepts w. Indeed, if w L 1 L 2 then either M 1 ccepts w or M 2 ccepts w. In either cse, since M simultes oth M 1 nd M 2, the string w must e ccepted y M. On the other hnd, if w is ccepted y M then the run of M on w cn e split into two runs: one is the run of M 1 on w nd the other is the run of M 2 on w. Since M ccepts w, it must e the cse tht one of the runs is ccepting. The nottion for the utomton uilt is this: M 1 M 2. Constructing utomt for the intersection opertion. Assume we re given two DFA M 1 = (S 1, q (1) 0, T 1, F 1 ) nd M 2 = (S 2, q (2) 0, T 2, F 2 ). These two DFA recognize lnguges L 1 = L(M 1 ) nd L 2 = L(M 2 ). We wnt to design DFA M = (S, q 0, T, F) tht recognizes the intersection L 1 L 2. We use the ide of constructing the DFA for the union of lnguges. Given n input w, we run M 1 nd M 2 on w simultneously s we explined for the union opertion. Once we finish the runs of M 1 nd of M 2 on w, we look t the resulting end sttes of these two runs. If oth end sttes re ccepting then we ccept w nd otherwise we reject w. Formlly, we define the DFA M = (S, q 0, T, F) tht recognizes the lnguge L 1 L 2 s follows: 1. The set S of sttes is S 1 S The initil stte is the pir (q (1) 0, q(2) 0 ). 3. The trnsition function T is the product of the trnsition functions T 1 nd T 2, tht is: T((p, q), σ) = (T 1 (p, σ), T 2 (q, σ)), where p S 1, q S 2, nd σ Σ. 4. The set F of finl sttes consists of ll pirs (p, q) such tht p F 1 nd q F 2. It is not difficult to prove tht M constructed recognizes L 1 L 2. The nottion for the utomton uilt is this: M 1 M 2. Constructing utomt for the complementtion opertion. Given DFA M = (S, q 0, T, F) we wnt to design DFA tht recognizes the complement of L(M). This is indeed very simple prolem s for this we just keep the sme sttes, the initil stte, nd the trnsition

10 function T. The only chnge we mke is tht we swp the ccepting sttes with the non-ccepting sttes. Thus, the utomton tht recognizes the lnguge Σ \L(M) is M (c) = (S, q 0, T, S \F). The most importnt prt in this construction is the following oservtion. On every input w, the DFA M (nd hence M (c) ) hs unique run. Therefore, M ccepts w if nd only if M (c) rejects w. 4 Minimiztion lgorithm Suppose tht we re given DFA A. The numer of sttes of A mesures the complexity of A. If A hs mny sttes then this could e due to two resons. One is tht the lnguge recognized y A cn e complex. Therefore there could e no wy to reduce the numer of sttes of A without chnging the lnguge recognized. The second is tht A could e implemented inefficiently nd therefore cn hve mny redundnt sttes. In this cse we would like to remove those redundnt sttes nd mke the utomton A smller. To mke ll these things more precise we give the following definition: Definition 5. We sy tht DFA A is equivlent to DFA B if L(A) = L(B). Thus, if A nd B re equivlent DFA, then for ny string w, A ccepts w if nd only if B ccepts w. Consider the two utomt, A 1 nd A 2, in Figure 6: A 1 is the utomton with three sttes nd A 2 with two sttes. Both A 1 nd A 2 re equivlent nd recognize the lnguge L = {w w {, } nd ech in w is followed y n lter on fter the }. There does not exist one stte utomton recognizing L. Therefore the two stte utomton A 2 hs the fewest possile sttes recognizing L. Fig.6. Two equivlent utomt Our gol is now to provide method tht reduces the redundnt sttes from given utomton. We give the following definition. Definition 6. We sy tht DFA A is miniml if no DFA B equivlent to A hs fewer sttes thn A itself.

11 For exmple, the two stte utomton A 2 in Figure 6 is miniml. Note tht, y dfeinition, for every DFA A there exists miniml utomton equivlent to A. Let A = (S, q 0, T, F) e DFA. Tke stte s S nd string w. Strting t stte s, run the utomton on string w. We denote the lst stte of this run y T(s, w). Formlly, the stte T(s, w) is defined inductively s follows: T(s, λ) = s, T(s, wσ) = T(T(s, w), σ), where w Σ. We now give the following importnt definition tht is used in constructing miniml utomt. Definition 7. Let p nd q e two sttes of the DFA A. We sy tht p nd q re indistinguishle if for ll strings w Σ, T(p, w) F if nd only if T(q, w) F. Otherwise, we sy tht the sttes p nd q re distinguishle For exmple, consider the utomton A 1 with three sttes in Figure 6. The two finl sttes re indistinguishle. If sttes p nd q re distinguishle then this is equivlent to sying the following. There exists string w such tht either T(p, w) F nd T(q, w) F or T(p, w) F nd T(q, w) F. We cll ny string w tht stisfies one of these two properties witness tht distinguishes p nd q. As n exmple, ny ccepting stte p is distinguishle from non-ccepting stte q. The string λ is witness tht distinguishes p nd q ecuse T(p, λ) F nd T(q, λ) F. Here is now the prolem we would like to solve. Design n lgorithm, tht given DFA A = (S, q 0, T, F, Σ), produces miniml DFA equivlent to A. In order to solve this prolem, let s nlyze the DFA A presented in Figure Fig. 7. A DFA for minimiztion The utomton A hs 9 sttes. We wnt to reduce the numer of sttes of this utomton nd uild smller utomton equivlent to it. First of ll, we remove ll the sttes tht re

12 not rechle from the initil stte. There is only one such stte which is 8. So we tke the stte 8 out nd the resulting utomton is still equivlent to the given one. From now on we ssume tht stte 8 does not exist. Secondly, the ide is this. For ech stte i we wnt to collpse ll sttes j indistinguishle from i into one stte denoted y [i]. Thus, the stte [i] is the set {j j is indistinguishle from i}. Clerly, every stte i elongs to [i]. Therefore [i]. This ide is implemented s follows. We form 8 8 tle whose rows nd columns re nmed y the sttes. The cell (i, j) in the tle represents the cell on row i nd column j. Initilly we hve the Tle Tle 2. Our gol is to put X s into those cells (i, j) such tht sttes i nd j re distinguishle. We know tht if one of the sttes i, j is ccepting nd the other is not then i nd j re distinguishle. Thus, we put X into ll cells (i, j) such tht either i or j is in F ut not oth. This produces Tle X X 1 X X 2 X X X X X X 3 X X 4 X X 5 X X 6 X X X X X X 7 X X Tle 3. We process Tle 3 s follows. Tke ny cell (p, q) tht is not mrked with n X. Put n X into cell (p, q) if there is symol σ {, } such tht the cell (r, s) is mrked with n X, where r = T(p, σ) nd s = T(q, σ). This process produces Tle 4.

13 We then process Tle 4 s follows in the sme wy s processed the previous tle. Nmely, tke ny cell (p, q) without n X. Put n X into the cell (p, q) if there is symol σ {, } such tht the cell (r, s) is mrked with n X, where r = T(p, σ) nd s = T(q, σ). This process produces Tle 5. Finlly, we process Tle 5 in the sme wy s ove, nd produce the finl Tle 6. We stop when there exists no cell such tht the cell is without n X nd cn still get n X with the method descried X X X X X 1 X X X X X 2 X X X X X X 3 X X X X X 4 X X X X X X X 5 X X X X X 6 X X X X 7 X X X X X X Tle X X X X X X 1 X X X X X 2 X X X X X X 3 X X X X X X 4 X X X X X X X 5 X X X X X X X 6 X X X X X 7 X X X X X X Tle 5. Consider the finl Tle 6. Tke ny stte i of the utomton, go through the ith row of the tle, collpse ll the sttes j such tht the cell (i, j) is not mrked with n X into one stte denoted y [i]. Thus, we hve [0] = {0, 3}, [1] = {1, 7}, [2] = {2, 6}, [4] = {4}, nd [5] = {5}. Thus we hve uilt new utomton A new with sttes [0], [1], [2], [4], nd [5] presented in Figure elow. Keeping the ove exmple in mind, we now present the minimiztion lgorithm nd prove its correctness. Let A = (S, q 0, T, F) e DFA. Here is the Minimiztion(A) lgorithm:

14 X X X X X X 1 X X X X X X 2 X X X X X X 3 X X X X X X 4 X X X X X X X 5 X X X X X X X 6 X X X X X X 7 X X X X X X Tle 6. [0] [1] [2] [4] [5] Fig.8. The DFA A new 1. Remove sttes tht re not rechle from the initil stte of A. (Comment: From now on we ssume tht ll the sttes of A re rechle from the initil stte). 2. Let 0, 1,..., n 1 e ll the sttes of A, where 0 is the initil stte. Mke n n n tle whose rows nd columns re leled with sttes. 3. Initilize the tle y mrking with n X ll the cells (i, j) such tht one of the sttes i, j is n ccepting stte nd the other is not. 4. Repet the following until no cell (i, j) cn e mrked with n X: () Mrk cell (p, q) with n X if (p, q) does not hve mrk, nd there is σ Σ such tht the cell (T(p, σ), T(q, σ) hs mrk. 5. For ech stte i define [i] to e the set {j the cell (i, j) is not mrked}, where i = 0,...,n Construct the following new DFA: () Declre ech [i] to e stte of the new DFA. () The initil stte is [0]. (c) Put trnsitions from ll [i] to [T(i, σ)] nd lel the trnsition y σ.

15 (d) Declre [i] to e n ccepting stte if i is n ccepting stte. The first step of the lgorithm produces the utomton tht is equivlent to the given one. Note tht Step 6 of the lgorithm defines sttes, the initil stte, trnsition, nd ccepting sttes of the new utomton. Our gol is to show tht the new utomton is correctly defined nd is miniml. To do this we now nlyze the lgorithm. There re n 2 cells in the initil tle defined t Step 2, the numer of mrked cells in the tle increses with ech itertion in Step 4, nd hence the lgorithm must terminte. Fct 1If cell (p, q) is mrked with n X then p nd q re distinguishle. If (p, q) is mrked t Step 2 of the lgorithm then p nd q re clerly distinguishle. The witness tht distinguishes these sttes is λ. Consider the loop of the lgorithm in Step 4. Assume (p, q) is mrked with n X ecuse there exists σ Σ such tht (T(p, σ), T(q, σ)) hs lredy een mrked. By inductive ssumption the sttes p = T(p, σ) nd q = T(q, σ) re distinguishle. Let w e the string distinguishing p nd q. Then σw distinguishes p nd q. Indeed, in this cse we hve T(p, σw) = T(T(p, σ), w) = T(p, w) nd T(q, σw) = T(T(q, σ), w) = T(q, w). This explins the fct. Fct 2.If cell (p, q) does not hve n X then p nd q re indistinguishle. Assume string w = σ 1... σ k distinguishes p nd q. Consider the following two sequences p 0 = p, p 1 = T(p 0, σ 1 ), p 2 = T(p 1, σ 2 ),...,p n = T(p n 1, σ n ) nd q 0 = q, q 1 = T(q 0, σ 1 ), q 2 = T(q 1, σ 2 ),..., q n = T(q n 1, σ n ). The pir (p n, q n ) gets n X y Step 2 of the lgorithm since w distinguishes p nd q. Therefore the pir (p n1, q n 1 ) must get mrk. Continue this on we see tht the pir (p 0, q 0 ) lso gets mrk X. This contrdicts the ssumption of the lemm. This explins the fct. For ech stte i S, the lgorithm considers the set [i] = {j the cell (i, j) is not mrked} nd declres [i] to e stte of the new DFA. These sttes stisfy the following properties (the reder, check ll these properties!): Property 1. Every stte i of the originl utomton is in [i]. Property 2. For ny two sttes [i] nd [j] either [i] = [j] or [i] [j] =. Property 3. If i nd j re indistinguishle then T(i, σ) nd T(j, σ) re lso indistinguishle. In the M inimiztion(a) lgorithm Step 5 constructs the deterministic finite utomton A new = (S new, q new, T new, F new ) s follows: 1. The set S new consists of ll the sttes [i]. 2. The initil stte q new is [0]. 3. T neq ([i], σ) = [T(i, σ)] for ll [i] S new nd σ Σ. 4. F new = {[i] i F }.

16 By properties 1 nd 2, ove the numer of sttes in A is not smller thn the numer of sttes in S new. Property 3 ove tells us tht this definition of T new is correct. In other words, T new is function from S new Σ to S new. Fct 3The DFA utomt A new nd A re equivlent. The proof of this fct follows from how we defined A new nd the previous fcts. Indeed, ssume tht w is ccepted y A. This mens tht T(0, w) F. By the definition of T new we then must hve T new ([0], w) = [T(0, w)]. Since T(0, w) F it must e the cse tht [T(0, w)] F new. Thus, w is ccepted y A new. Now ssume tht A new ccepts w. Then T new ([0], w) F new which mens [T(0, w)] F new. Therefore, T(0, w) F nd hence A ccepts w. Now we wnt to show tht the DFA A new is miniml DFA equivlent to the given DFA A. For this we need to show tht ny miniml DFA equivlent to A does not hve fewer sttes thn A new. Thus, let A = (S, q 0, T, F ) e miniml utomton equivlent to A. We wnt to show tht A new nd A hve the sme numer of sttes. We reson recursively tht defines function f from sttes of A into the sttes of A new. Bsis: In this cse we mp q 0 to [0]. Thus we hve prtil function f : S S new such tht no two sttes in S re mpped into the sme stte in S new. Inductive step. Our hypothesis is the following. We hve uilt prtil function f : S S new such tht no two sttes in S re mpped into the sme stte in S new. Moreover, for ny s Domin(f) the following property is stisfied. The sttes s nd f(s) re indistinguishle in the sense tht for ll w Σ, T(s, w) F if nd only if T new (f(s), w) F new. Assume tht f is not totl. Tke p Domin(f) nd σ Σ such tht T(p, σ) = q nd q Domin(f). Such p nd σ must exist s f is not totl. Define the vlue of f on q s follows. Declre the vlue of f on q to e T new (f(p ), σ). This vlue T new (f(p ), σ) of f cn not e equl to ny other vlue s S new from the rnge of f defined in the previous steps of the construction of f. Otherwise, s nd T new (f(p ), σ) would e indistinguishle. Continuing this construction of f, when the construction termintes we hve totl ijective function from S to S new. This shows tht A new hs the sme numer of sttes s the miniml the miniml utomton A. Thus, we hve proved the lgorithm Minimiztion(A) is correct. In other words, given DFA A the lgorithm produces miniml DFA equivlent to A.

Regular Sets and Expressions

Regular Sets and Expressions Regulr Sets nd Expressions Finite utomt re importnt in science, mthemtics, nd engineering. Engineers like them ecuse they re super models for circuits (And, since the dvent of VLSI systems sometimes finite

More information

Homework 3 Solutions

Homework 3 Solutions CS 341: Foundtions of Computer Science II Prof. Mrvin Nkym Homework 3 Solutions 1. Give NFAs with the specified numer of sttes recognizing ech of the following lnguges. In ll cses, the lphet is Σ = {,1}.

More information

One Minute To Learn Programming: Finite Automata

One Minute To Learn Programming: Finite Automata Gret Theoreticl Ides In Computer Science Steven Rudich CS 15-251 Spring 2005 Lecture 9 Fe 8 2005 Crnegie Mellon University One Minute To Lern Progrmming: Finite Automt Let me tech you progrmming lnguge

More information

Reasoning to Solve Equations and Inequalities

Reasoning to Solve Equations and Inequalities Lesson4 Resoning to Solve Equtions nd Inequlities In erlier work in this unit, you modeled situtions with severl vriles nd equtions. For exmple, suppose you were given usiness plns for concert showing

More information

FORMAL LANGUAGES, AUTOMATA AND THEORY OF COMPUTATION EXERCISES ON REGULAR LANGUAGES

FORMAL LANGUAGES, AUTOMATA AND THEORY OF COMPUTATION EXERCISES ON REGULAR LANGUAGES FORMAL LANGUAGES, AUTOMATA AND THEORY OF COMPUTATION EXERCISES ON REGULAR LANGUAGES Introduction This compendium contins exercises out regulr lnguges for the course Forml Lnguges, Automt nd Theory of Computtion

More information

Solution to Problem Set 1

Solution to Problem Set 1 CSE 5: Introduction to the Theory o Computtion, Winter A. Hevi nd J. Mo Solution to Prolem Set Jnury, Solution to Prolem Set.4 ). L = {w w egin with nd end with }. q q q q, d). L = {w w h length t let

More information

Bayesian Updating with Continuous Priors Class 13, 18.05, Spring 2014 Jeremy Orloff and Jonathan Bloom

Bayesian Updating with Continuous Priors Class 13, 18.05, Spring 2014 Jeremy Orloff and Jonathan Bloom Byesin Updting with Continuous Priors Clss 3, 8.05, Spring 04 Jeremy Orloff nd Jonthn Bloom Lerning Gols. Understnd prmeterized fmily of distriutions s representing continuous rnge of hypotheses for the

More information

LINEAR TRANSFORMATIONS AND THEIR REPRESENTING MATRICES

LINEAR TRANSFORMATIONS AND THEIR REPRESENTING MATRICES LINEAR TRANSFORMATIONS AND THEIR REPRESENTING MATRICES DAVID WEBB CONTENTS Liner trnsformtions 2 The representing mtrix of liner trnsformtion 3 3 An ppliction: reflections in the plne 6 4 The lgebr of

More information

A.7.1 Trigonometric interpretation of dot product... 324. A.7.2 Geometric interpretation of dot product... 324

A.7.1 Trigonometric interpretation of dot product... 324. A.7.2 Geometric interpretation of dot product... 324 A P P E N D I X A Vectors CONTENTS A.1 Scling vector................................................ 321 A.2 Unit or Direction vectors...................................... 321 A.3 Vector ddition.................................................

More information

CS99S Laboratory 2 Preparation Copyright W. J. Dally 2001 October 1, 2001

CS99S Laboratory 2 Preparation Copyright W. J. Dally 2001 October 1, 2001 CS99S Lortory 2 Preprtion Copyright W. J. Dlly 2 Octoer, 2 Ojectives:. Understnd the principle of sttic CMOS gte circuits 2. Build simple logic gtes from MOS trnsistors 3. Evlute these gtes to oserve logic

More information

PROF. BOYAN KOSTADINOV NEW YORK CITY COLLEGE OF TECHNOLOGY, CUNY

PROF. BOYAN KOSTADINOV NEW YORK CITY COLLEGE OF TECHNOLOGY, CUNY MAT 0630 INTERNET RESOURCES, REVIEW OF CONCEPTS AND COMMON MISTAKES PROF. BOYAN KOSTADINOV NEW YORK CITY COLLEGE OF TECHNOLOGY, CUNY Contents 1. ACT Compss Prctice Tests 1 2. Common Mistkes 2 3. Distributive

More information

Polynomial Functions. Polynomial functions in one variable can be written in expanded form as ( )

Polynomial Functions. Polynomial functions in one variable can be written in expanded form as ( ) Polynomil Functions Polynomil functions in one vrible cn be written in expnded form s n n 1 n 2 2 f x = x + x + x + + x + x+ n n 1 n 2 2 1 0 Exmples of polynomils in expnded form re nd 3 8 7 4 = 5 4 +

More information

EQUATIONS OF LINES AND PLANES

EQUATIONS OF LINES AND PLANES EQUATIONS OF LINES AND PLANES MATH 195, SECTION 59 (VIPUL NAIK) Corresponding mteril in the ook: Section 12.5. Wht students should definitely get: Prmetric eqution of line given in point-direction nd twopoint

More information

0.1 Basic Set Theory and Interval Notation

0.1 Basic Set Theory and Interval Notation 0.1 Bsic Set Theory nd Intervl Nottion 3 0.1 Bsic Set Theory nd Intervl Nottion 0.1.1 Some Bsic Set Theory Notions Like ll good Mth ooks, we egin with definition. Definition 0.1. A set is well-defined

More information

FAULT TREES AND RELIABILITY BLOCK DIAGRAMS. Harry G. Kwatny. Department of Mechanical Engineering & Mechanics Drexel University

FAULT TREES AND RELIABILITY BLOCK DIAGRAMS. Harry G. Kwatny. Department of Mechanical Engineering & Mechanics Drexel University SYSTEM FAULT AND Hrry G. Kwtny Deprtment of Mechnicl Engineering & Mechnics Drexel University OUTLINE SYSTEM RBD Definition RBDs nd Fult Trees System Structure Structure Functions Pths nd Cutsets Reliility

More information

and thus, they are similar. If k = 3 then the Jordan form of both matrices is

and thus, they are similar. If k = 3 then the Jordan form of both matrices is Homework ssignment 11 Section 7. pp. 249-25 Exercise 1. Let N 1 nd N 2 be nilpotent mtrices over the field F. Prove tht N 1 nd N 2 re similr if nd only if they hve the sme miniml polynomil. Solution: If

More information

Regular Languages and Finite Automata

Regular Languages and Finite Automata N Lecture Notes on Regulr Lnguges nd Finite Automt for Prt IA of the Computer Science Tripos Mrcelo Fiore Cmbridge University Computer Lbortory First Edition 1998. Revised 1999, 2000, 2001, 2002, 2003,

More information

Or more simply put, when adding or subtracting quantities, their uncertainties add.

Or more simply put, when adding or subtracting quantities, their uncertainties add. Propgtion of Uncertint through Mthemticl Opertions Since the untit of interest in n eperiment is rrel otined mesuring tht untit directl, we must understnd how error propgtes when mthemticl opertions re

More information

Generating In-Line Monitors For Rabin Automata

Generating In-Line Monitors For Rabin Automata Generting In-Line Monitors For Rin Automt Hugues Chot, Rphel Khoury, nd Ndi Twi Lvl University, Deprtment of Computer Science nd Softwre Engineering, Pvillon Adrien-Pouliot, 1065, venue de l Medecine Queec

More information

Section 5-4 Trigonometric Functions

Section 5-4 Trigonometric Functions 5- Trigonometric Functions Section 5- Trigonometric Functions Definition of the Trigonometric Functions Clcultor Evlution of Trigonometric Functions Definition of the Trigonometric Functions Alternte Form

More information

Integration by Substitution

Integration by Substitution Integrtion by Substitution Dr. Philippe B. Lvl Kennesw Stte University August, 8 Abstrct This hndout contins mteril on very importnt integrtion method clled integrtion by substitution. Substitution is

More information

1.2 The Integers and Rational Numbers

1.2 The Integers and Rational Numbers .2. THE INTEGERS AND RATIONAL NUMBERS.2 The Integers n Rtionl Numers The elements of the set of integers: consist of three types of numers: Z {..., 5, 4, 3, 2,, 0,, 2, 3, 4, 5,...} I. The (positive) nturl

More information

5 a LAN 6 a gateway 7 a modem

5 a LAN 6 a gateway 7 a modem STARTER With the help of this digrm, try to descrie the function of these components of typicl network system: 1 file server 2 ridge 3 router 4 ckone 5 LAN 6 gtewy 7 modem Another Novell LAN Router Internet

More information

Example 27.1 Draw a Venn diagram to show the relationship between counting numbers, whole numbers, integers, and rational numbers.

Example 27.1 Draw a Venn diagram to show the relationship between counting numbers, whole numbers, integers, and rational numbers. 2 Rtionl Numbers Integers such s 5 were importnt when solving the eqution x+5 = 0. In similr wy, frctions re importnt for solving equtions like 2x = 1. Wht bout equtions like 2x + 1 = 0? Equtions of this

More information

Words Symbols Diagram. abcde. a + b + c + d + e

Words Symbols Diagram. abcde. a + b + c + d + e Logi Gtes nd Properties We will e using logil opertions to uild mhines tht n do rithmeti lultions. It s useful to think of these opertions s si omponents tht n e hooked together into omplex networks. To

More information

Chapter. Contents: A Constructing decimal numbers

Chapter. Contents: A Constructing decimal numbers Chpter 9 Deimls Contents: A Construting deiml numers B Representing deiml numers C Deiml urreny D Using numer line E Ordering deimls F Rounding deiml numers G Converting deimls to frtions H Converting

More information

Java CUP. Java CUP Specifications. User Code Additions You may define Java code to be included within the generated parser:

Java CUP. Java CUP Specifications. User Code Additions You may define Java code to be included within the generated parser: Jv CUP Jv CUP is prser-genertion tool, similr to Ycc. CUP uilds Jv prser for LALR(1) grmmrs from production rules nd ssocited Jv code frgments. When prticulr production is recognized, its ssocited code

More information

Math 135 Circles and Completing the Square Examples

Math 135 Circles and Completing the Square Examples Mth 135 Circles nd Completing the Squre Exmples A perfect squre is number such tht = b 2 for some rel number b. Some exmples of perfect squres re 4 = 2 2, 16 = 4 2, 169 = 13 2. We wish to hve method for

More information

flex Regular Expressions and Lexical Scanning Regular Expressions and flex Examples on Alphabet A = {a,b} (Standard) Regular Expressions on Alphabet A

flex Regular Expressions and Lexical Scanning Regular Expressions and flex Examples on Alphabet A = {a,b} (Standard) Regular Expressions on Alphabet A flex Regulr Expressions nd Lexicl Scnning Using flex to Build Scnner flex genertes lexicl scnners: progrms tht discover tokens. Tokens re the smllest meningful units of progrm (or other string). flex is

More information

2 DIODE CLIPPING and CLAMPING CIRCUITS

2 DIODE CLIPPING and CLAMPING CIRCUITS 2 DIODE CLIPPING nd CLAMPING CIRCUITS 2.1 Ojectives Understnding the operting principle of diode clipping circuit Understnding the operting principle of clmping circuit Understnding the wveform chnge of

More information

Appendix D: Completing the Square and the Quadratic Formula. In Appendix A, two special cases of expanding brackets were considered:

Appendix D: Completing the Square and the Quadratic Formula. In Appendix A, two special cases of expanding brackets were considered: Appendi D: Completing the Squre nd the Qudrtic Formul Fctoring qudrtic epressions such s: + 6 + 8 ws one of the topics introduced in Appendi C. Fctoring qudrtic epressions is useful skill tht cn help you

More information

Experiment 6: Friction

Experiment 6: Friction Experiment 6: Friction In previous lbs we studied Newton s lws in n idel setting, tht is, one where friction nd ir resistnce were ignored. However, from our everydy experience with motion, we know tht

More information

Algebra Review. How well do you remember your algebra?

Algebra Review. How well do you remember your algebra? Algebr Review How well do you remember your lgebr? 1 The Order of Opertions Wht do we men when we write + 4? If we multiply we get 6 nd dding 4 gives 10. But, if we dd + 4 = 7 first, then multiply by then

More information

Modular Generic Verification of LTL Properties for Aspects

Modular Generic Verification of LTL Properties for Aspects Modulr Generic Verifiction of LTL Properties for Aspects Mx Goldmn Shmuel Ktz Computer Science Deprtment Technion Isrel Institute of Technology {mgoldmn, ktz}@cs.technion.c.il ABSTRACT Aspects re seprte

More information

Lec 2: Gates and Logic

Lec 2: Gates and Logic Lec 2: Gtes nd Logic Kvit Bl CS 34, Fll 28 Computer Science Cornell University Announcements Clss newsgroup creted Posted on we-pge Use it for prtner finding First ssignment is to find prtners Due this

More information

Pointed Regular Expressions

Pointed Regular Expressions Pointed Regulr Expressions Andre Asperti 1, Cludio Scerdoti Coen 1, nd Enrico Tssi 2 1 Deprtment of Computer Science, University of Bologn sperti@cs.unio.it scerdot@cs.unio.it 2 INRIA-Micorsoft tssi@cs.unio.it

More information

Binary Representation of Numbers Autar Kaw

Binary Representation of Numbers Autar Kaw Binry Representtion of Numbers Autr Kw After reding this chpter, you should be ble to: 1. convert bse- rel number to its binry representtion,. convert binry number to n equivlent bse- number. In everydy

More information

9 CONTINUOUS DISTRIBUTIONS

9 CONTINUOUS DISTRIBUTIONS 9 CONTINUOUS DISTIBUTIONS A rndom vrible whose vlue my fll nywhere in rnge of vlues is continuous rndom vrible nd will be ssocited with some continuous distribution. Continuous distributions re to discrete

More information

Use Geometry Expressions to create a more complex locus of points. Find evidence for equivalence using Geometry Expressions.

Use Geometry Expressions to create a more complex locus of points. Find evidence for equivalence using Geometry Expressions. Lerning Objectives Loci nd Conics Lesson 3: The Ellipse Level: Preclculus Time required: 120 minutes In this lesson, students will generlize their knowledge of the circle to the ellipse. The prmetric nd

More information

1.00/1.001 Introduction to Computers and Engineering Problem Solving Fall 2011 - Final Exam

1.00/1.001 Introduction to Computers and Engineering Problem Solving Fall 2011 - Final Exam 1./1.1 Introduction to Computers nd Engineering Problem Solving Fll 211 - Finl Exm Nme: MIT Emil: TA: Section: You hve 3 hours to complete this exm. In ll questions, you should ssume tht ll necessry pckges

More information

Pentominoes. Pentominoes. Bruce Baguley Cascade Math Systems, LLC. The pentominoes are a simple-looking set of objects through which some powerful

Pentominoes. Pentominoes. Bruce Baguley Cascade Math Systems, LLC. The pentominoes are a simple-looking set of objects through which some powerful Pentominoes Bruce Bguley Cscde Mth Systems, LLC Astrct. Pentominoes nd their reltives the polyominoes, polycues, nd polyhypercues will e used to explore nd pply vrious importnt mthemticl concepts. In this

More information

Two hours UNIVERSITY OF MANCHESTER SCHOOL OF COMPUTER SCIENCE. Date: Friday 16 th May 2008. Time: 14:00 16:00

Two hours UNIVERSITY OF MANCHESTER SCHOOL OF COMPUTER SCIENCE. Date: Friday 16 th May 2008. Time: 14:00 16:00 COMP20212 Two hours UNIVERSITY OF MANCHESTER SCHOOL OF COMPUTER SCIENCE Digitl Design Techniques Dte: Fridy 16 th My 2008 Time: 14:00 16:00 Plese nswer ny THREE Questions from the FOUR questions provided

More information

SE3BB4: Software Design III Concurrent System Design. Sample Solutions to Assignment 1

SE3BB4: Software Design III Concurrent System Design. Sample Solutions to Assignment 1 SE3BB4: Softwre Design III Conurrent System Design Winter 2011 Smple Solutions to Assignment 1 Eh question is worth 10pts. Totl of this ssignment is 70pts. Eh ssignment is worth 9%. If you think your solution

More information

Operations with Polynomials

Operations with Polynomials 38 Chpter P Prerequisites P.4 Opertions with Polynomils Wht you should lern: Write polynomils in stndrd form nd identify the leding coefficients nd degrees of polynomils Add nd subtrct polynomils Multiply

More information

Mathematics. Vectors. hsn.uk.net. Higher. Contents. Vectors 128 HSN23100

Mathematics. Vectors. hsn.uk.net. Higher. Contents. Vectors 128 HSN23100 hsn.uk.net Higher Mthemtics UNIT 3 OUTCOME 1 Vectors Contents Vectors 18 1 Vectors nd Sclrs 18 Components 18 3 Mgnitude 130 4 Equl Vectors 131 5 Addition nd Subtrction of Vectors 13 6 Multipliction by

More information

Basic Research in Computer Science BRICS RS-02-13 Brodal et al.: Solving the String Statistics Problem in Time O(n log n)

Basic Research in Computer Science BRICS RS-02-13 Brodal et al.: Solving the String Statistics Problem in Time O(n log n) BRICS Bsic Reserch in Computer Science BRICS RS-02-13 Brodl et l.: Solving the String Sttistics Prolem in Time O(n log n) Solving the String Sttistics Prolem in Time O(n log n) Gerth Stølting Brodl Rune

More information

A Visual and Interactive Input abb Automata. Theory Course with JFLAP 4.0

A Visual and Interactive Input abb Automata. Theory Course with JFLAP 4.0 Strt Puse Step Noninverted Tree A Visul nd Interctive Input Automt String ccepted! 5 nodes generted. Theory Course with JFLAP 4.0 q0 even 's, even 's q2 even 's, odd 's q1 odd 's, even 's q3 odd 's, odd

More information

Integration. 148 Chapter 7 Integration

Integration. 148 Chapter 7 Integration 48 Chpter 7 Integrtion 7 Integrtion t ech, by supposing tht during ech tenth of second the object is going t constnt speed Since the object initilly hs speed, we gin suppose it mintins this speed, but

More information

P.3 Polynomials and Factoring. P.3 an 1. Polynomial STUDY TIP. Example 1 Writing Polynomials in Standard Form. What you should learn

P.3 Polynomials and Factoring. P.3 an 1. Polynomial STUDY TIP. Example 1 Writing Polynomials in Standard Form. What you should learn 33337_0P03.qp 2/27/06 24 9:3 AM Chpter P Pge 24 Prerequisites P.3 Polynomils nd Fctoring Wht you should lern Polynomils An lgeric epression is collection of vriles nd rel numers. The most common type of

More information

Regular Repair of Specifications

Regular Repair of Specifications Regulr Repir of Specifictions Michel Benedikt Oxford University michel.enedikt@coml.ox.c.uk Griele Puppis Oxford University griele.puppis@coml.ox.c.uk Cristin Riveros Oxford University cristin.riveros@coml.ox.c.uk

More information

4.11 Inner Product Spaces

4.11 Inner Product Spaces 314 CHAPTER 4 Vector Spces 9. A mtrix of the form 0 0 b c 0 d 0 0 e 0 f g 0 h 0 cnnot be invertible. 10. A mtrix of the form bc d e f ghi such tht e bd = 0 cnnot be invertible. 4.11 Inner Product Spces

More information

Unambiguous Recognizable Two-dimensional Languages

Unambiguous Recognizable Two-dimensional Languages Unmbiguous Recognizble Two-dimensionl Lnguges Mrcell Anselmo, Dor Gimmrresi, Mri Mdoni, Antonio Restivo (Univ. of Slerno, Univ. Rom Tor Vergt, Univ. of Ctni, Univ. of Plermo) W2DL, My 26 REC fmily I REC

More information

Lecture 5. Inner Product

Lecture 5. Inner Product Lecture 5 Inner Product Let us strt with the following problem. Given point P R nd line L R, how cn we find the point on the line closest to P? Answer: Drw line segment from P meeting the line in right

More information

The remaining two sides of the right triangle are called the legs of the right triangle.

The remaining two sides of the right triangle are called the legs of the right triangle. 10 MODULE 6. RADICAL EXPRESSIONS 6 Pythgoren Theorem The Pythgoren Theorem An ngle tht mesures 90 degrees is lled right ngle. If one of the ngles of tringle is right ngle, then the tringle is lled right

More information

Vectors 2. 1. Recap of vectors

Vectors 2. 1. Recap of vectors Vectors 2. Recp of vectors Vectors re directed line segments - they cn be represented in component form or by direction nd mgnitude. We cn use trigonometry nd Pythgors theorem to switch between the forms

More information

9.3. The Scalar Product. Introduction. Prerequisites. Learning Outcomes

9.3. The Scalar Product. Introduction. Prerequisites. Learning Outcomes The Sclr Product 9.3 Introduction There re two kinds of multipliction involving vectors. The first is known s the sclr product or dot product. This is so-clled becuse when the sclr product of two vectors

More information

Example A rectangular box without lid is to be made from a square cardboard of sides 18 cm by cutting equal squares from each corner and then folding

Example A rectangular box without lid is to be made from a square cardboard of sides 18 cm by cutting equal squares from each corner and then folding 1 Exmple A rectngulr box without lid is to be mde from squre crdbord of sides 18 cm by cutting equl squres from ech corner nd then folding up the sides. 1 Exmple A rectngulr box without lid is to be mde

More information

19. The Fermat-Euler Prime Number Theorem

19. The Fermat-Euler Prime Number Theorem 19. The Fermt-Euler Prime Number Theorem Every prime number of the form 4n 1 cn be written s sum of two squres in only one wy (side from the order of the summnds). This fmous theorem ws discovered bout

More information

Bypassing Space Explosion in Regular Expression Matching for Network Intrusion Detection and Prevention Systems

Bypassing Space Explosion in Regular Expression Matching for Network Intrusion Detection and Prevention Systems Bypssing Spce Explosion in Regulr Expression Mtching for Network Intrusion Detection n Prevention Systems Jignesh Ptel, Alex Liu n Eric Torng Dept. of Computer Science n Engineering Michign Stte University

More information

. At first sight a! b seems an unwieldy formula but use of the following mnemonic will possibly help. a 1 a 2 a 3 a 1 a 2

. At first sight a! b seems an unwieldy formula but use of the following mnemonic will possibly help. a 1 a 2 a 3 a 1 a 2 7 CHAPTER THREE. Cross Product Given two vectors = (,, nd = (,, in R, the cross product of nd written! is defined to e: " = (!,!,! Note! clled cross is VECTOR (unlike which is sclr. Exmple (,, " (4,5,6

More information

Rotating DC Motors Part II

Rotating DC Motors Part II Rotting Motors rt II II.1 Motor Equivlent Circuit The next step in our consiertion of motors is to evelop n equivlent circuit which cn be use to better unerstn motor opertion. The rmtures in rel motors

More information

Basic Analysis of Autarky and Free Trade Models

Basic Analysis of Autarky and Free Trade Models Bsic Anlysis of Autrky nd Free Trde Models AUTARKY Autrky condition in prticulr commodity mrket refers to sitution in which country does not engge in ny trde in tht commodity with other countries. Consequently

More information

Physics 43 Homework Set 9 Chapter 40 Key

Physics 43 Homework Set 9 Chapter 40 Key Physics 43 Homework Set 9 Chpter 4 Key. The wve function for n electron tht is confined to x nm is. Find the normliztion constnt. b. Wht is the probbility of finding the electron in. nm-wide region t x

More information

APPLICATION NOTE Revision 3.0 MTD/PS-0534 August 13, 2008 KODAK IMAGE SENDORS COLOR CORRECTION FOR IMAGE SENSORS

APPLICATION NOTE Revision 3.0 MTD/PS-0534 August 13, 2008 KODAK IMAGE SENDORS COLOR CORRECTION FOR IMAGE SENSORS APPLICATION NOTE Revision 3.0 MTD/PS-0534 August 13, 2008 KODAK IMAGE SENDORS COLOR CORRECTION FOR IMAGE SENSORS TABLE OF FIGURES Figure 1: Spectrl Response of CMOS Imge Sensor...3 Figure 2: Byer CFA Ptterns...4

More information

Learning Outcomes. Computer Systems - Architecture Lecture 4 - Boolean Logic. What is Logic? Boolean Logic 10/28/2010

Learning Outcomes. Computer Systems - Architecture Lecture 4 - Boolean Logic. What is Logic? Boolean Logic 10/28/2010 /28/2 Lerning Outcomes At the end of this lecture you should: Computer Systems - Architecture Lecture 4 - Boolen Logic Eddie Edwrds eedwrds@doc.ic.c.uk http://www.doc.ic.c.uk/~eedwrds/compsys (Hevily sed

More information

How fast can we sort? Sorting. Decision-tree model. Decision-tree for insertion sort Sort a 1, a 2, a 3. CS 3343 -- Spring 2009

How fast can we sort? Sorting. Decision-tree model. Decision-tree for insertion sort Sort a 1, a 2, a 3. CS 3343 -- Spring 2009 CS 4 -- Spring 2009 Sorting Crol Wenk Slides courtesy of Chrles Leiserson with smll chnges by Crol Wenk CS 4 Anlysis of Algorithms 1 How fst cn we sort? All the sorting lgorithms we hve seen so fr re comprison

More information

Solving the String Statistics Problem in Time O(n log n)

Solving the String Statistics Problem in Time O(n log n) Solving the String Sttistics Prolem in Time O(n log n) Gerth Stølting Brodl 1,,, Rune B. Lyngsø 3, Ann Östlin1,, nd Christin N. S. Pedersen 1,2, 1 BRICS, Deprtment of Computer Science, University of Arhus,

More information

Protocol Analysis. 17-654/17-764 Analysis of Software Artifacts Kevin Bierhoff

Protocol Analysis. 17-654/17-764 Analysis of Software Artifacts Kevin Bierhoff Protocol Anlysis 17-654/17-764 Anlysis of Softwre Artifcts Kevin Bierhoff Tke-Awys Protocols define temporl ordering of events Cn often be cptured with stte mchines Protocol nlysis needs to py ttention

More information

DATABASDESIGN FÖR INGENJÖRER - 1056F

DATABASDESIGN FÖR INGENJÖRER - 1056F DATABASDESIGN FÖR INGENJÖRER - 06F Sommr 00 En introuktionskurs i tssystem http://user.it.uu.se/~ul/t-sommr0/ lt. http://www.it.uu.se/eu/course/homepge/esign/st0/ Kjell Orsorn (Rusln Fomkin) Uppsl Dtse

More information

RTL Power Optimization with Gate-level Accuracy

RTL Power Optimization with Gate-level Accuracy RTL Power Optimiztion with Gte-level Accurcy Qi Wng Cdence Design Systems, Inc Sumit Roy Clypto Design Systems, Inc 555 River Oks Prkwy, Sn Jose 95125 2903 Bunker Hill Lne, Suite 208, SntClr 95054 qwng@cdence.com

More information

1 Fractions from an advanced point of view

1 Fractions from an advanced point of view 1 Frtions from n vne point of view We re going to stuy frtions from the viewpoint of moern lger, or strt lger. Our gol is to evelop eeper unerstning of wht n men. One onsequene of our eeper unerstning

More information

Concept Formation Using Graph Grammars

Concept Formation Using Graph Grammars Concept Formtion Using Grph Grmmrs Istvn Jonyer, Lwrence B. Holder nd Dine J. Cook Deprtment of Computer Science nd Engineering University of Texs t Arlington Box 19015 (416 Ytes St.), Arlington, TX 76019-0015

More information

Graphs on Logarithmic and Semilogarithmic Paper

Graphs on Logarithmic and Semilogarithmic Paper 0CH_PHClter_TMSETE_ 3//00 :3 PM Pge Grphs on Logrithmic nd Semilogrithmic Pper OBJECTIVES When ou hve completed this chpter, ou should be ble to: Mke grphs on logrithmic nd semilogrithmic pper. Grph empiricl

More information

Review guide for the final exam in Math 233

Review guide for the final exam in Math 233 Review guide for the finl exm in Mth 33 1 Bsic mteril. This review includes the reminder of the mteril for mth 33. The finl exm will be cumultive exm with mny of the problems coming from the mteril covered

More information

On the expressive power of temporal logic

On the expressive power of temporal logic On the expressive power of temporl logic Joëlle Cohen, Dominique Perrin nd Jen-Eric Pin LITP, Pris, FRANCE Astrct We study the expressive power of liner propositionl temporl logic interpreted on finite

More information

Section 5.2, Commands for Configuring ISDN Protocols. Section 5.3, Configuring ISDN Signaling. Section 5.4, Configuring ISDN LAPD and Call Control

Section 5.2, Commands for Configuring ISDN Protocols. Section 5.3, Configuring ISDN Signaling. Section 5.4, Configuring ISDN LAPD and Call Control Chpter 5 Configurtion of ISDN Protocols This chpter provides instructions for configuring the ISDN protocols in the SP201 for signling conversion. Use the sections tht reflect the softwre you re configuring.

More information

Learning Workflow Petri Nets

Learning Workflow Petri Nets Lerning Workflow Petri Nets Jvier Esprz, Mrtin Leucker, nd Mximilin Schlund Technische Universität München, Boltzmnnstr. 3, 85748 Grching, Germny {esprz,leucker,schlund}@in.tum.de Abstrct. Workflow mining

More information

2005-06 Second Term MAT2060B 1. Supplementary Notes 3 Interchange of Differentiation and Integration

2005-06 Second Term MAT2060B 1. Supplementary Notes 3 Interchange of Differentiation and Integration Source: http://www.mth.cuhk.edu.hk/~mt26/mt26b/notes/notes3.pdf 25-6 Second Term MAT26B 1 Supplementry Notes 3 Interchnge of Differentition nd Integrtion The theme of this course is bout vrious limiting

More information

Lectures 8 and 9 1 Rectangular waveguides

Lectures 8 and 9 1 Rectangular waveguides 1 Lectures 8 nd 9 1 Rectngulr wveguides y b x z Consider rectngulr wveguide with 0 < x b. There re two types of wves in hollow wveguide with only one conductor; Trnsverse electric wves

More information

Econ 4721 Money and Banking Problem Set 2 Answer Key

Econ 4721 Money and Banking Problem Set 2 Answer Key Econ 472 Money nd Bnking Problem Set 2 Answer Key Problem (35 points) Consider n overlpping genertions model in which consumers live for two periods. The number of people born in ech genertion grows in

More information

Unit 6: Exponents and Radicals

Unit 6: Exponents and Radicals Eponents nd Rdicls -: The Rel Numer Sstem Unit : Eponents nd Rdicls Pure Mth 0 Notes Nturl Numers (N): - counting numers. {,,,,, } Whole Numers (W): - counting numers with 0. {0,,,,,, } Integers (I): -

More information

Automated Grading of DFA Constructions

Automated Grading of DFA Constructions Automted Grding of DFA Constructions Rjeev Alur nd Loris D Antoni Sumit Gulwni Dileep Kini nd Mhesh Viswnthn Deprtment of Computer Science Microsoft Reserch Deprtment of Computer Science University of

More information

5.2. LINE INTEGRALS 265. Let us quickly review the kind of integrals we have studied so far before we introduce a new one.

5.2. LINE INTEGRALS 265. Let us quickly review the kind of integrals we have studied so far before we introduce a new one. 5.2. LINE INTEGRALS 265 5.2 Line Integrls 5.2.1 Introduction Let us quickly review the kind of integrls we hve studied so fr before we introduce new one. 1. Definite integrl. Given continuous rel-vlued

More information

Firm Objectives. The Theory of the Firm II. Cost Minimization Mathematical Approach. First order conditions. Cost Minimization Graphical Approach

Firm Objectives. The Theory of the Firm II. Cost Minimization Mathematical Approach. First order conditions. Cost Minimization Graphical Approach Pro. Jy Bhttchry Spring 200 The Theory o the Firm II st lecture we covered: production unctions Tody: Cost minimiztion Firm s supply under cost minimiztion Short vs. long run cost curves Firm Ojectives

More information

Angles 2.1. Exercise 2.1... Find the size of the lettered angles. Give reasons for your answers. a) b) c) Example

Angles 2.1. Exercise 2.1... Find the size of the lettered angles. Give reasons for your answers. a) b) c) Example 2.1 Angles Reognise lternte n orresponing ngles Key wors prllel lternte orresponing vertilly opposite Rememer, prllel lines re stright lines whih never meet or ross. The rrows show tht the lines re prllel

More information

MATH 150 HOMEWORK 4 SOLUTIONS

MATH 150 HOMEWORK 4 SOLUTIONS MATH 150 HOMEWORK 4 SOLUTIONS Section 1.8 Show tht the product of two of the numbers 65 1000 8 2001 + 3 177, 79 1212 9 2399 + 2 2001, nd 24 4493 5 8192 + 7 1777 is nonnegtive. Is your proof constructive

More information

Babylonian Method of Computing the Square Root: Justifications Based on Fuzzy Techniques and on Computational Complexity

Babylonian Method of Computing the Square Root: Justifications Based on Fuzzy Techniques and on Computational Complexity Bbylonin Method of Computing the Squre Root: Justifictions Bsed on Fuzzy Techniques nd on Computtionl Complexity Olg Koshelev Deprtment of Mthemtics Eduction University of Texs t El Pso 500 W. University

More information

AntiSpyware Enterprise Module 8.5

AntiSpyware Enterprise Module 8.5 AntiSpywre Enterprise Module 8.5 Product Guide Aout the AntiSpywre Enterprise Module The McAfee AntiSpywre Enterprise Module 8.5 is n dd-on to the VirusScn Enterprise 8.5i product tht extends its ility

More information

Multiplication and Division - Left to Right. Addition and Subtraction - Left to Right.

Multiplication and Division - Left to Right. Addition and Subtraction - Left to Right. Order of Opertions r of Opertions Alger P lese Prenthesis - Do ll grouped opertions first. E cuse Eponents - Second M D er Multipliction nd Division - Left to Right. A unt S hniqu Addition nd Sutrction

More information

1. Find the zeros Find roots. Set function = 0, factor or use quadratic equation if quadratic, graph to find zeros on calculator

1. Find the zeros Find roots. Set function = 0, factor or use quadratic equation if quadratic, graph to find zeros on calculator AP Clculus Finl Review Sheet When you see the words. This is wht you think of doing. Find the zeros Find roots. Set function =, fctor or use qudrtic eqution if qudrtic, grph to find zeros on clcultor.

More information

Automata theory. An algorithmic approach. Lecture Notes. Javier Esparza

Automata theory. An algorithmic approach. Lecture Notes. Javier Esparza Automt theory An lgorithmic pproch 0 Lecture Notes Jvier Esprz My 3, 2016 2 3 Plese red this! Mny yers go I don t wnt to sy how mny, it s depressing I tught course on the utomt-theoretic pproch to model

More information

Math 314, Homework Assignment 1. 1. Prove that two nonvertical lines are perpendicular if and only if the product of their slopes is 1.

Math 314, Homework Assignment 1. 1. Prove that two nonvertical lines are perpendicular if and only if the product of their slopes is 1. Mth 4, Homework Assignment. Prove tht two nonverticl lines re perpendiculr if nd only if the product of their slopes is. Proof. Let l nd l e nonverticl lines in R of slopes m nd m, respectively. Suppose

More information

Start Here. IMPORTANT: To ensure that the software is installed correctly, do not connect the USB cable until step 17. Remove tape and cardboard

Start Here. IMPORTANT: To ensure that the software is installed correctly, do not connect the USB cable until step 17. Remove tape and cardboard Strt Here 1 IMPORTANT: To ensure tht the softwre is instlled correctly, do not connect the USB cle until step 17. Follow the steps in order. If you hve prolems during setup, see Trouleshooting in the lst

More information

1. Introduction. 1.1. Texts and their processing

1. Introduction. 1.1. Texts and their processing Chpter 1 3 21/7/97 1. Introduction 1.1. Texts nd their processing One of the simplest nd nturl types of informtion representtion is y mens of written texts. Dt to e processed often does not decompose into

More information

Rotational Equilibrium: A Question of Balance

Rotational Equilibrium: A Question of Balance Prt of the IEEE Techer In-Service Progrm - Lesson Focus Demonstrte the concept of rottionl equilirium. Lesson Synopsis The Rottionl Equilirium ctivity encourges students to explore the sic concepts of

More information

www.mathsbox.org.uk e.g. f(x) = x domain x 0 (cannot find the square root of negative values)

www.mathsbox.org.uk e.g. f(x) = x domain x 0 (cannot find the square root of negative values) www.mthsbo.org.uk CORE SUMMARY NOTES Functions A function is rule which genertes ectl ONE OUTPUT for EVERY INPUT. To be defined full the function hs RULE tells ou how to clculte the output from the input

More information

, and the number of electrons is -19. e e 1.60 10 C. The negatively charged electrons move in the direction opposite to the conventional current flow.

, and the number of electrons is -19. e e 1.60 10 C. The negatively charged electrons move in the direction opposite to the conventional current flow. Prolem 1. f current of 80.0 ma exists in metl wire, how mny electrons flow pst given cross section of the wire in 10.0 min? Sketch the directions of the current nd the electrons motion. Solution: The chrge

More information

Data Compression. Lossless And Lossy Compression

Data Compression. Lossless And Lossy Compression Dt Compression Reduce the size of dt. ƒ Reduces storge spce nd hence storge cost. Compression rtio = originl dt size/compressed dt size ƒ Reduces time to retrieve nd trnsmit dt. Lossless And Lossy Compression

More information

6.2 Volumes of Revolution: The Disk Method

6.2 Volumes of Revolution: The Disk Method mth ppliction: volumes of revolution, prt ii Volumes of Revolution: The Disk Method One of the simplest pplictions of integrtion (Theorem ) nd the ccumultion process is to determine so-clled volumes of

More information