COMPUTATIONAL PROCESSES IN LIVING CELLS
|
|
- Samantha Dickerson
- 5 years ago
- Views:
Transcription
1 COMPUTATIONAL PROCESSES IN LIVING CELLS Lecture 7: Formal Systems for Gene Assembly in Ciliates: the String Pointer Reduction System March 31, 2010
2 MDS-descriptors MDS descriptors: strings over the following alphabet: Γ κ = { (b, e), (e, b) } { (i, j), (j, i) 2 i < j κ } { (b, i), (i, b), (i, e), (e, i) 2 i κ }. The realistic MDS descriptor associated to actin I gene in O.nova (3, 4)(4, 5)(6, 7)(5, 6)(7, 8)(9, e)(3, 2)(b, 2)(8, 9) A realistic MDS descriptor: (2, 3)(5, 4)(b, 2)(5, e)(3, 4) A non-realistic MDS descriptor: (b, 2)(e, b)(2, 3) 1
3 LD, HI, DLAD on realistic MDS descriptors For each p Π κ, the ld-rule for p is defined as follows: ld p (δ 1 (q, p)(p, r)δ 2 ) = δ 1 (q, r)δ 2, ld p ((p, m 1 )(m 2, p)) = (m 2, m 1 ), where q, r Π ex,κ, m 1, m 2 are markers and δ 1, δ 2 (Γ κ ). The first case is a simple application of ld: the two occurrences of p are separated by one IES only The second case is a boundary application of ld: all the other MDSs are between the two occurrences of p. We can always assume that the boundary ld is the last step of the assembly: (p, m 1 )(m 2, p), with m 1, m 2 markers. 2
4 LD, HI, DLAD on realistic MDS descriptors For each p Π κ, the hi-rule for p is defined as follows: hi p (δ 1 (p, q)δ 2 (p, r)δ 3 ) = δ 1 δ 2 (q, r)δ 3, hi p (δ 1 (q, p)δ 2 (r, p)δ 3 ) = δ 1 (q, r)δ 2 δ 3, where q, r Π ex,κ and δ i (Γ κ ) for each i = 1, 2, 3. Note that here the pointer p must be positive in the MDS descriptor to which hi p is applicable. 3
5 LD, HI, DLAD on realistic MDS descriptors dlad p,q (δ 1 (p, r 1 )δ 2 (q, r 2 )δ 3 (r 3, p)δ 4 (r 4, q)δ 5 ) = δ 1 δ 4 (r 4, r 2 )δ 3 (r 3, r 1 )δ 2 δ 5, dlad p,q (δ 1 (p, r 1 )δ 2 (r 2, q)δ 3 (r 3, p)δ 4 (q, r 4 )δ 5 ) = δ 1 δ 4 δ 3 (r 3, r 1 )δ 2 (r 2, r 4 )δ 5, dlad p,q (δ 1 (r 1, p)δ 2 (q, r 2 )δ 3 (p, r 3 )δ 4 (r 4, q)δ 5 ) = δ 1 (r 1, r 3 )δ 4 (r 4, r 2 )δ 3 δ 2 δ 5, dlad p,q (δ 1 (r 1, p)δ 2 (r 2, q)δ 3 (p, r 3 )δ 4 (q, r 4 )δ 5 ) = δ 1 (r 1, r 3 )δ 4 δ 3 δ 2 (r 2, r 4 )δ 5, dlad p,q (δ 1 (p, r 1 )δ 2 (q, p)δ 4 (r 4, q)δ 5 ) = δ 1 δ 4 (r 4, r 1 )δ 2 δ 5, dlad p,q (δ 1 (p, q)δ 3 (r 3, p)δ 4 (q, r 4 )δ 5 ) = δ 1 δ 4 δ 3 (r 3, r 4 )δ 5, dlad p,q (δ 1 (r 1, p)δ 2 (q, r 2 )δ 3 (p, q)δ 5 ) = δ 1 (r 1, r 2 )δ 3 δ 2 δ 5, where r i Π ex,κ and δ i (Γ κ ) for each i. The pointers p and q overlap and they both must be negative. 4
6 Next level of abstraction: strings MDS descriptors: faithful representation of the genomic structure in ciliates (only the IESs are dropped from the representation) Difficult to work on this level because of the involved definitions (too many details preserved) Idea: Make further simplifications in the representation 5
7 Simplifying the representation Gene assembly in ciliates A process of MDS ordering and assembling: reduce the number of MDSs with each step of the assembly A process of reducing pointers: a number of pointers in the beginning; 2 or 4 pointers are eliminated with each step of the process Question: Could it be possible to represent the genomic structure using pointers only, without essential loss of information? Remarkable simplification: at this level, the gene would only be represented by a linear sequence of symbols 6
8 Plan Simplify the structure by keeping only the sequence of pointers New framework: signed double occurrence strings Define the operations: The String Pointer Reduction System Prove formally that no essential information is lost, as far as the gene assembly is concerned 7
9 Some definitions Let δ = (x 1, x 2 )(x 3, x 4 )... (x 2n 1, x 2n ) be a realistic MDS descriptor. If r is a pointer and x i, x j {r, r}, then the set {x i, x i+1,..., x j } is the r-interval of r If both r and r occur in δ, then r is positive in δ If r has two occurrences in δ, then r is negative in δ Left occurrence: p in (p, q) Right occurrence: q in (p, q) 8
10 Some definitions Let δ = (p, q) Γ κ. If p, q κ, then p is an incoming pointer and q is an outgoing pointer in δ. If p, q κ, then p is an outgoing pointer and q is an incoming pointer in δ. Example: (2, 3)(5, 4)(b, 2)(5, e)(3, 4) 2 is incoming and 3 is outgoing; 5 is outgoing and 4 is incoming 9
11 On MDS descriptors Let δ Γ κ be a realistic MDS descriptor. Then: For any marker m Ψ, δ has exactly one occurrence from {m, m}. Each pointer p Π κ of δ has exactly two occurrences in δ. If p is negative, then one occurrence is left and one is right. If p is positive, then both occurrences are left or both are right. 10
12 If δ = δ 1 (x, y)δ 2, where (x, y) = (b, e) or (x, y) = (e, b) and δ 1, δ 2 Γ κ, then δ 1 = δ 2 = Λ. Similarly, if δ = δ 1 (p, m 1 )(m 2, p)δ 2, with m 1, m 2 markers, then δ 1 = δ 2 = Λ.
13 Second level of abstraction: strings Idea: model the MDS structure of the gene by its sequence of pointers only: signed double occurrence strings Compared with the MDS descriptors, we get rid of the parenthesis and the markers Note: the loss of information appears to be huge; e.g., there are different MDS descriptors having the same sequence of pointers Example: (b, 2)(3, 4)(e, 4)(3, 2) (2, 3)(4, e)(4, 3)(2, b)
14 Second level of abstraction: strings Idea: model the MDS structure of the gene by its sequence of pointers only: signed double occurrence strings Compared with the MDS descriptors, we get rid of the parenthesis and the markers Note: the loss of information appears to be huge; e.g., there are different MDS descriptors having the same sequence of pointers Nevertheless, as far as the gene assembly process is concerned, no essential information is lost; on the other hand, we simplify the model by removing the unnecessary details 12
15 The framework: legal and realistic strings A string v Σ over an (unsigned) alphabet Σ is a double occurrence string, if every letter a dom(v) occurs exactly twice in v. A signing of a nonempty double occurrence string is called a legal string. Notation: Σ = (Σ Σ) is the set of signed strings over Σ Let a Σ Σ and let u Σ be a legal string. If u contains both a and a, then a is positive in u; otherwise, a is negative in u. 13
16 Example u = u is legal. Pointers 2 and 5 are positive in u, while 3 and 4 are negative in u. w = w is not legal:??? 14
17 Example u = u is legal. Pointers 2 and 5 are positive in u, while 3 and 4 are negative in u. w = w is not legal: ξ(w) = is not a double occurrence string. (Recall that ξ removes the bars from the strings.) 15
18 Intervals and overlaps u = a 1 a 2... a n a legal string over Σ, where a i Σ Σ for each i. For each letter a occurring in u, there are 1 i < j n such that ξ(a i ) = a = ξ(a j ). Then is the a-interval of u. u (a) = a i a i+1... a j a, b Σ are overlapping in u if the a-interval and the b-interval of u overlap: if u (a) = a i1... a j1 and u (b) = a i2... a j2, then either i 1 < i 2 < j 1 < j 2 or i 2 < i 1 < j 2 < j 1. 16
19 Intervals and overlaps Denote: O u (a) = {b Σ b overlaps with a in u} {a}. Similarly, denote by O u + (a) (Ou (a), resp.) the set of all positive letters (negative letters, resp.) in O u (a). Note: it is convenient to let a O u (a). If a is positive in u, then a O u + (a), and if a is negative in u, then a Ou (a). 17
20 From MDS descriptors to legal strings Idea: drop the parenthesis and the markers, retaining only the sequence of pointers. The result is a signed double occurrence string - legal string More formally, rem κ: Γ κ κ is the morphism that removes the parentheses and the markers from each MDS descriptor, defined as rem κ (x, y) = for all (x, y) Γ κ. Λ if x, y Ψ, x if x κ κ, y Ψ, y if x Ψ, y κ κ, xy if x, y κ κ 18
21 Example The realistic MDS descriptor associated to actin I gene in O.nova (3, 4)(4, 5)(6, 7)(5, 6)(7, 8)(9, e)(3, 2)(b, 2)(8, 9) Its corresponding legal string is 19
22 Example The realistic MDS descriptor associated to actin I gene in O.nova (3, 4)(4, 5)(6, 7)(5, 6)(7, 8)(9, e)(3, 2)(b, 2)(8, 9) Its corresponding legal string is
23 Realistic strings A legal string u is realistic if there exists a realistic MDS descriptor δ such that u = rem κ (δ) for some κ Previous example: is realistic Question: Are there strings that are not realistic? Yes! Example: u = is legal, but it is not realistic Proof: 21
24 Realistic strings A legal string u is realistic if there exists a realistic MDS descriptor δ such that u = rem κ (δ) for some κ Previous example: is realistic Question: Are there strings that are not realistic? Yes! Example: u = is legal, but it is not realistic Proof: An easy analysis shows that it is impossible to construct a corresponding MDS descriptor 22
25 Analyzing the loss of information Some structural information about the gene does get lost in the model simplification: there are different MDS descriptors with the same associated realistic string. Characterization of those MDS descriptors: consider M 1 M 2... M κ Let and (k 1, k 2 ) = (κ, κ 1), if κ is odd, (κ 1, κ), if κ is even. α o = M 1 M 3... M k1 and α e = M 2 M 4... M k2. 23
26 The loss of information: ambiguous MDS descriptors Let α 1 and α 2 be two different micronuclear sequences of size κ. Then α 1 and α 2 have the same associated legal string if and only if one of the following four conditions holds: α 1 = α o α e and α 2 = α e α o, (i) α 1 = α o α e and α 2 = α e α o, (ii) α 1 = α o α e and α 2 = α e α o, (iii) α 1 = α o α e and α 2 = α e α o. (iv) 24
27 The loss of information: ambiguous MDS descriptors Let α 1 and α 2 be two different micronuclear sequences of size κ. Then α 1 and α 2 have the same associated legal string if and only if one of the following four conditions holds: α 1 = α o α e and α 2 = α e α o, (i) κ κ α 1 = α o α e and α 2 = α e α o, (ii) α 1 = α o α e and α 2 = α e α o, (iii) α 1 = α o α e and α 2 = α e α o. (iv) 25
28 The loss of information: ambiguous MDS descriptors Let α 1 and α 2 be two different micronuclear sequences of size κ. Then α 1 and α 2 have the same associated legal string if and only if one of the following four conditions holds: α 1 = α o α e and α 2 = α e α o, (i) α 1 = α o α e and α 2 = α e α o, (ii) κ κ α 1 = α o α e and α 2 = α e α o, (iii) α 1 = α o α e and α 2 = α e α o. (iv) 26
29 The loss of information: ambiguous MDS descriptors Let α 1 and α 2 be two different micronuclear sequences of size κ. Then α 1 and α 2 have the same associated legal string if and only if one of the following four conditions holds: α 1 = α o α e and α 2 = α e α o, (i) α 1 = α o α e and α 2 = α e α o, (ii) α 1 = α o α e and α 2 = α e α o, (iii) κ κ α 1 = α o α e and α 2 = α e α o. (iv) 27
30 The loss of information: ambiguous MDS descriptors Let α 1 and α 2 be two different micronuclear sequences of size κ. Then α 1 and α 2 have the same associated legal string if and only if one of the following four conditions holds: α 1 = α o α e and α 2 = α e α o, (i) α 1 = α o α e and α 2 = α e α o, (ii) α 1 = α o α e and α 2 = α e α o, (iii) α 1 = α o α e and α 2 = α e α o. (iv) κ κ
31 The only ambiguous realistic strings are the following: κ κ (i) κ κ (ii) κ κ (iii) κ κ (iv)
32 String Pointer Reduction System Second level of abstraction: legal words and string pointer reduction systems Translate the MDS descriptor rules to legal strings Result: the string pointer reduction system modelling the transformation of pointers during gene assembly. This system consists of three operations, the equivalent for legal strings of ld, hi, dlad Prove the equivalence with the MDS descriptor rewriting system 29
33 String Pointer Reduction System The equivalents for strings of the three molecular operations ld, hi, dlad are snr, spr, sdr We use sometimes also the notation ld, hi, dlad to denote the operations on strings, if there is no risk of confusion Each of the string operations below maps legal strings to legal strings. 30
34 String Pointer Reduction System The string negative rule snr p for a pointer p Π is applicable to a legal string of the form u = u 1 ppu 2, where u 1, u 2. The result of this operation is snr p (u 1 p p u 2 ) = u 1 u 2. The string positive rule spr p for a pointer p Π is applicable to a legal string of the form u = u 1 pu 2 pu 3, where u 1, u 2, u 3. The result of this operation is spr p (u 1 p u 2 p u 3 ) = u 1 u 2 u 3. 31
35 The string double rule sdr p,q for pointers p, q Π with p q is applicable to a legal string of the form u = u 1 pu 2 qu 3 pu 4 qu 5, where u i for each i. The result of this operation is sdr p,q (u 1 p u 2 q u 3 p u 4 q u 5 ) = u 1 u 4 u 3 u 2 u 5.
36 String Pointer Reduction System Only three types of rules MDS descriptors: 11 cases of rules (2 for ld, 2 for hi, and 7 for dlad) Therefore, the string pointer reduction system is considerably simpler than the MDS pointer reduction system 32
37 String Pointer Reduction System A composition ϕ = ϕ n... ϕ 1 of operations from {snr p, spr p, sdr p,q p, q Π} is applicable to a legal string u, if ϕ 1 is applicable to u, and ϕ i is applicable to ϕ i 1... ϕ 1 (u) for all 1 < i n. ϕ is a string reduction of u, if ϕ is applicable to u. ϕ is successful for u, if ϕ(u) = Λ, the empty string. Looking for a gene assembly strategy means now to look for a successful reduction of the corresponding realistic string. 33
38 Example The realistic string corresponding to the actin I gene in O.nova: A successful reduction:
39 Example: assembling gene actin I in S.Nova Step 1: LD 38
40 Example: assembling the actini gene in S.nova Step 2: DLAD 39
41 Example: assembling the actini gene in S.nova Step 3: LD 40
42 Example: assembling the actini gene in S.nova Step 4: DLAD 41
43 Example: assembling the actini gene in S.nova Step 5: HI 42
44 Example: assembling the actini gene in S.nova Step 6: HI 43
45 Example The realistic string corresponding to the actin I gene in O.nova: A successful reduction: snr sdr 5, snr sdr 8, spr spr 3 Λ 41
46 Correctness of the reduction from MDS descriptors to legal strings Question: is the string pointer reduction system equivalent to the MDS pointer reduction system? In other words: For a realistic MDS descriptor δ, can we translate a successful assembly of δ into a successful reduction of its corresponding realistic string? Also the other way around: for a realistic string u, can we translate a successful reduction of u into a successful assembly of its corresponding realistic MDS descriptors? 42
47 BONUS TOPIC Recovering the gene structure from the pointer sequence Problem: We get the sequence of pointers from the lab, but we do not know which is the first pointer, which is the second, etc. Deduce this information. Note: In general the problem is in fact more complicated because one does not know which of the reported sequences are inversions of ciliate pointers. For simplicity, assume here that we do have the information on the orientation of the pointers. 43
48 Recovering the gene structure from the pointer sequence The problem in formal terms A legal string u over Σ is said to be realizable if u is isomorphic to a realistic legal string, i.e., if there exists an injective morphism τ : Σ such that τ(σ) and τ(u) is realistic. Decide if a legal string is realizable and if it is, construct a corresponding MDS descriptor 44
49 Example u = is legal. u is not realistic: can never be a substring of a realistic legal string. u is realizable: define τ(2) = 2, τ(3) = 5, τ(4) = 4, and τ(5) = 3: is realistic. τ(u) =
50 Solution: graphs and alternating hamiltonian paths We associate to a legal string w = a 1 a 2... a 2κ a graph A w, with labels both on vertices and edges Vertices: V = {1, 2,..., 2κ} with labels l(i) = a i. Edges: E = E 0 E 1, where with the labels E 0 = { (i, j) a i = a j, 1 i < j 2κ }, E 1 = { (i, j) j i = 1, 1 i < 2κ }, h(e) = 0 if e E 0, 1 if e E 1. 46
51 Example Let w = be a legal string. Its associated graph is drawn below: a solid line represents the color 1 and a dashed line the color 0. The labels of the vertices are written beneath them
52 Alternating hamiltonian path A path e 1 e 2...e k in the graph A w is alternating if h(e 2i+1 )=0and h(e 2(i+1) )=1for each i. An alternating path is called alternating hamiltonian if it visits every vertex of the graph exactly once. 38
53 Example The previous example visited. The graph presented in the previous example has an alternating hamiltonian path, drawn in the second picture below
54 Relabelling a realizable string to get a realistic one Based on the alternating Hamiltonian path, one can easily define a relabelling transforming the string into a realistic one, see bellow an example (the previous example continued)
55 Relabelling a realizable string to get a realistic one For a legal string and a pointer x occurring, one can define a unique alternating path starting at x in the following way: Start with the edge x 1 0 x2, where x 1 = x and l(x 2 )=l(x 1 ). Iterate then the next step: Suppose the alternating path x 1 0 x xi 1 0 xi has been constructed so that the color of the edge {x i 1,x i } is 0. If x i is labelled with a signed letter in w, then the next edges are {x i,x i 1} (of color 1) and {x i 1,x i+1 } (of color 0), where l(x i+1 )=l(x i ). 41
56 Relabelling a realizable string to get a realistic one Result: Let v be a legal string. Then v is realizable if and only if there exists a vertex x of A v such that the induced alternating path alt(v) is an alternating hamiltonian path of A v. 42
Computational processes
Spring 2010 Computational processes in living cells Lecture 6: Gene assembly as a pointer reduction in MDS descriptors Vladimir Rogojin Department of IT, Abo Akademi http://www.abo.fi/~ipetre/compproc/
More informationCOMPUTATIONAL PROCESSES IN LIVING CELLS
COMPUTATIONAL PROCESSES IN LIVING CELLS Lecture 9: Equivalence between the three Pointer Reduction Systems: MDS descriptor, String, and Graph April 15, 2010 Gene assembly in ciliates: the LD operation
More informationPatterns of Simple Gene Assembly in Ciliates
Patterns of Simple Gene Assembly in Ciliates Tero Harju Department of Mathematics, University of Turku Turku 20014 Finland harju@utu.fi Ion Petre Academy of Finland and Department of Information Technologies
More informationComputational nature of gene assembly in ciliates
Computational nature of gene assembly in ciliates Robert Brijder 1, Mark Daley 2, Tero Harju 3, Natasha Jonoska 4, Ion Petre 5, and Grzegorz Rozenberg 1,6 1 Leiden Institute of Advanced Computer Science,
More informationComplexity Measures for Gene Assembly
Tero Harju Chang Li Ion Petre Grzegorz Rozenberg Complexity Measures for Gene Assembly TUCS Technical Report No 781, September 2006 Complexity Measures for Gene Assembly Tero Harju Department of Mathematics,
More informationContext-free grammars and languages
Context-free grammars and languages The next class of languages we will study in the course is the class of context-free languages. They are defined by the notion of a context-free grammar, or a CFG for
More informationDiagram groups and directed 2-complexes: homotopy and homology
Diagram groups and directed 2-complexes: homotopy and homology V. S. Guba, M. V. Sapir Abstract We show that diagram groups can be viewed as fundamental groups of spaces of positive paths on directed 2-complexes
More informationContents. basic algebra. Learning outcomes. Time allocation. 1. Mathematical notation and symbols. 2. Indices. 3. Simplification and factorisation
basic algebra Contents. Mathematical notation and symbols 2. Indices 3. Simplification and factorisation 4. Arithmetic of algebraic fractions 5. Formulae and transposition Learning outcomes In this workbook
More informationLaw of Trichotomy and Boundary Equations
Law of Trichotomy and Boundary Equations Law of Trichotomy: For any two real numbers a and b, exactly one of the following is true. i. a < b ii. a = b iii. a > b The Law of Trichotomy is a formal statement
More informationTheoretical Computer Science. Rewriting rule chains modeling DNA rearrangement pathways
Theoretical Computer Science 454 (2012) 5 22 Contents lists available at SciVerse ScienceDirect Theoretical Computer Science journal homepage: www.elsevier.com/locate/tcs Rewriting rule chains modeling
More informationApproximating Shortest Superstring Problem Using de Bruijn Graphs
Approximating Shortest Superstring Problem Using de Bruijn Advanced s Course Presentation Farshad Barahimi Department of Computer Science University of Lethbridge November 19, 2013 This presentation is
More informationTwo models for gene assembly in ciliates
Two models for gene assembly in ciliates Tero Harju 1,3, Ion Petre 2,3, and Grzegorz Rozenberg 4 1 Deartment of Mathematics, University of Turku Turku 20014 Finland harju@utu.fi 2 Deartment of Comuter
More informationAutomata & languages. A primer on the Theory of Computation. Laurent Vanbever. ETH Zürich (D-ITET) September,
Automata & languages A primer on the Theory of Computation Laurent Vanbever www.vanbever.eu ETH Zürich (D-ITET) September, 24 2015 Last week was all about Deterministic Finite Automaton We saw three main
More informationDiscrete Applied Mathematics. Maximal pivots on graphs with an application to gene assembly
Discrete Applied Mathematics 158 (2010) 1977 1985 Contents lists available at ScienceDirect Discrete Applied Mathematics journal homepage: www.elsevier.com/locate/dam Maximal pivots on graphs with an application
More information3130CIT Theory of Computation
GRIFFITH UNIVERSITY School of Computing and Information Technology 3130CIT Theory of Computation Final Examination, Semester 2, 2006 Details Total marks: 120 (40% of the total marks for this subject) Perusal:
More informationchapter 12 MORE MATRIX ALGEBRA 12.1 Systems of Linear Equations GOALS
chapter MORE MATRIX ALGEBRA GOALS In Chapter we studied matrix operations and the algebra of sets and logic. We also made note of the strong resemblance of matrix algebra to elementary algebra. The reader
More informationFoundations of
91.304 Foundations of (Theoretical) Computer Science Chapter 1 Lecture Notes (Section 1.3: Regular Expressions) David Martin dm@cs.uml.edu d with some modifications by Prof. Karen Daniels, Spring 2012
More informationSystems of Nonlinear Equations and Inequalities: Two Variables
Systems of Nonlinear Equations and Inequalities: Two Variables By: OpenStaxCollege Halley s Comet ([link]) orbits the sun about once every 75 years. Its path can be considered to be a very elongated ellipse.
More informationModels of Natural Computation: Gene Assembly and Membrane Systems. Robert Brijder
Models of Natural Computation: Gene Assembly and Membrane Systems Robert Brijder The work in this thesis has been carried out under the auspices of the research school IPA (Institute for Programming research
More informationPart I. Gene Assembly in Ciliates
Part I Gene Assembly in Ciliates Chater 2 Reducibility of Gene Patterns in Ciliates using the Breakoint Grah Abstract Gene assembly in ciliates is one of the most involved DNA rocessings going on in any
More informationCS:4330 Theory of Computation Spring Regular Languages. Finite Automata and Regular Expressions. Haniel Barbosa
CS:4330 Theory of Computation Spring 2018 Regular Languages Finite Automata and Regular Expressions Haniel Barbosa Readings for this lecture Chapter 1 of [Sipser 1996], 3rd edition. Sections 1.1 and 1.3.
More informationIntroduction to Theory of Computing
CSCI 2670, Fall 2012 Introduction to Theory of Computing Department of Computer Science University of Georgia Athens, GA 30602 Instructor: Liming Cai www.cs.uga.edu/ cai 0 Lecture Note 3 Context-Free Languages
More informationLecture 23 : Nondeterministic Finite Automata DRAFT Connection between Regular Expressions and Finite Automata
CS/Math 24: Introduction to Discrete Mathematics 4/2/2 Lecture 23 : Nondeterministic Finite Automata Instructor: Dieter van Melkebeek Scribe: Dalibor Zelený DRAFT Last time we designed finite state automata
More informationChapter 1. ANALYZE AND SOLVE LINEAR EQUATIONS (3 weeks)
Chapter 1. ANALYZE AND SOLVE LINEAR EQUATIONS (3 weeks) Solve linear equations in one variable. 8EE7ab In this Chapter we review and complete the 7th grade study of elementary equations and their solution
More informationNondeterministic Finite Automata
Nondeterministic Finite Automata Mahesh Viswanathan Introducing Nondeterminism Consider the machine shown in Figure. Like a DFA it has finitely many states and transitions labeled by symbols from an input
More informationAuthor: Vivek Kulkarni ( )
Author: Vivek Kulkarni ( vivek_kulkarni@yahoo.com ) Chapter-2: Finite State Machines Solutions for Review Questions @ Oxford University Press 2013. All rights reserved. 1 Q.1 Construct Mealy and Moore
More informationFinite Automata Theory and Formal Languages TMV027/DIT321 LP4 2018
Finite Automata Theory and Formal Languages TMV027/DIT321 LP4 2018 Lecture 14 Ana Bove May 14th 2018 Recap: Context-free Grammars Simplification of grammars: Elimination of ǫ-productions; Elimination of
More informationAutomata & languages. A primer on the Theory of Computation. Laurent Vanbever. ETH Zürich (D-ITET) September,
Automata & languages A primer on the Theory of Computation Laurent Vanbever www.vanbever.eu ETH Zürich (D-ITET) September, 28 2017 Part 2 out of 5 Last week was all about Deterministic Finite Automaton
More informationDr. Relja Vulanovic Professor of Mathematics Kent State University at Stark c 2008
MATH-LITERACY MANUAL Dr. Relja Vulanovic Professor of Mathematics Kent State University at Stark c 2008 2 Algebraic Epressions 2.1 Terms and Factors 29 2.2 Types of Algebraic Epressions 32 2.3 Transforming
More information3515ICT: Theory of Computation. Regular languages
3515ICT: Theory of Computation Regular languages Notation and concepts concerning alphabets, strings and languages, and identification of languages with problems (H, 1.5). Regular expressions (H, 3.1,
More informationModal Logic. UIT2206: The Importance of Being Formal. Martin Henz. March 19, 2014
Modal Logic UIT2206: The Importance of Being Formal Martin Henz March 19, 2014 1 Motivation The source of meaning of formulas in the previous chapters were models. Once a particular model is chosen, say
More informationTheory of Computation
Thomas Zeugmann Hokkaido University Laboratory for Algorithmics http://www-alg.ist.hokudai.ac.jp/ thomas/toc/ Lecture 12: Turing Machines Turing Machines I After having dealt with partial recursive functions,
More informationLecture 18: Inapproximability of MAX-3-SAT
CS 880: Advanced Complexity Theory 3/7/2008 Lecture 18: Inapproximability of MAX-3-SAT Instructor: Dieter van Melkebeek Scribe: Jeff Kinne In this lecture we prove a tight inapproximability result for
More informationChapter 4: Computation tree logic
INFOF412 Formal verification of computer systems Chapter 4: Computation tree logic Mickael Randour Formal Methods and Verification group Computer Science Department, ULB March 2017 1 CTL: a specification
More information3. Only sequences that were formed by using finitely many applications of rules 1 and 2, are propositional formulas.
1 Chapter 1 Propositional Logic Mathematical logic studies correct thinking, correct deductions of statements from other statements. Let us make it more precise. A fundamental property of a statement is
More informationCompilers. Lexical analysis. Yannis Smaragdakis, U. Athens (original slides by Sam
Compilers Lecture 3 Lexical analysis Yannis Smaragdakis, U. Athens (original slides by Sam Guyer@Tufts) Big picture Source code Front End IR Back End Machine code Errors Front end responsibilities Check
More informationTheoretical Computer Science
Theoretical Computer Science 411 (2010) 919 925 Contents lists available at ScienceDirect Theoretical Computer Science journal homepage: www.elsevier.com/locate/tcs Algorithmic properties of ciliate sequence
More informationChapter 6: NFA Applications
Chapter 6: NFA Applications Implementing NFAs The problem with implementing NFAs is that, being nondeterministic, they define a more complex computational procedure for testing language membership. To
More informationUndecidable Problems. Z. Sawa (TU Ostrava) Introd. to Theoretical Computer Science May 12, / 65
Undecidable Problems Z. Sawa (TU Ostrava) Introd. to Theoretical Computer Science May 12, 2018 1/ 65 Algorithmically Solvable Problems Let us assume we have a problem P. If there is an algorithm solving
More informationMining Infrequent Patterns of Two Frequent Substrings from a Single Set of Biological Sequences
Mining Infrequent Patterns of Two Frequent Substrings from a Single Set of Biological Sequences Daisuke Ikeda Department of Informatics, Kyushu University 744 Moto-oka, Fukuoka 819-0395, Japan. daisuke@inf.kyushu-u.ac.jp
More informationLecture Notes on Inductive Definitions
Lecture Notes on Inductive Definitions 15-312: Foundations of Programming Languages Frank Pfenning Lecture 2 September 2, 2004 These supplementary notes review the notion of an inductive definition and
More informationCS 581: Introduction to the Theory of Computation! Lecture 1!
CS 581: Introduction to the Theory of Computation! Lecture 1! James Hook! Portland State University! hook@cs.pdx.edu! http://www.cs.pdx.edu/~hook/cs581f10/! Welcome!! Contact Information! Jim Hook! Office:
More informationAn algebraic view of topological -machines
An algebraic view of topological -machines Luke Grecki Graduate Group in Applied Mathematics lgrecki@math.ucdavis.edu June 8, 2010 1 Contents 1 Semigroups 3 2 Semigroups of automata 4 3 -machine words
More informationTime to learn about NP-completeness!
Time to learn about NP-completeness! Harvey Mudd College March 19, 2007 Languages A language is a set of strings Examples The language of strings of all zeros with odd length The language of strings with
More informationFinite Automata Part One
Finite Automata Part One Computability Theory What problems can we solve with a computer? What kind of computer? Computers are Messy http://en.wikipedia.org/wiki/file:eniac.jpg Computers are Messy That
More informationChapter 2 Linear Equations and Inequalities in One Variable
Chapter 2 Linear Equations and Inequalities in One Variable Section 2.1: Linear Equations in One Variable Section 2.3: Solving Formulas Section 2.5: Linear Inequalities in One Variable Section 2.6: Compound
More informationPractical Algebra. A Step-by-step Approach. Brought to you by Softmath, producers of Algebrator Software
Practical Algebra A Step-by-step Approach Brought to you by Softmath, producers of Algebrator Software 2 Algebra e-book Table of Contents Chapter 1 Algebraic expressions 5 1 Collecting... like terms 5
More informationCOMP/MATH 300 Topics for Spring 2017 June 5, Review and Regular Languages
COMP/MATH 300 Topics for Spring 2017 June 5, 2017 Review and Regular Languages Exam I I. Introductory and review information from Chapter 0 II. Problems and Languages A. Computable problems can be expressed
More informationFinite Automata and Formal Languages
Finite Automata and Formal Languages TMV26/DIT32 LP4 2 Lecture 6 April 5th 2 Regular expressions (RE) are an algebraic way to denote languages. Given a RE R, it defines the language L(R). Actually, they
More informationClosure Properties of Regular Languages. Union, Intersection, Difference, Concatenation, Kleene Closure, Reversal, Homomorphism, Inverse Homomorphism
Closure Properties of Regular Languages Union, Intersection, Difference, Concatenation, Kleene Closure, Reversal, Homomorphism, Inverse Homomorphism Closure Properties Recall a closure property is a statement
More informationIntroduction to Arithmetic Geometry Fall 2013 Lecture #23 11/26/2013
18.782 Introduction to Arithmetic Geometry Fall 2013 Lecture #23 11/26/2013 As usual, a curve is a smooth projective (geometrically irreducible) variety of dimension one and k is a perfect field. 23.1
More informationDeterministic Finite Automata (DFAs)
CS/ECE 374: Algorithms & Models of Computation, Fall 28 Deterministic Finite Automata (DFAs) Lecture 3 September 4, 28 Chandra Chekuri (UIUC) CS/ECE 374 Fall 28 / 33 Part I DFA Introduction Chandra Chekuri
More informationNo Solution Equations Let s look at the following equation: 2 +3=2 +7
5.4 Solving Equations with Infinite or No Solutions So far we have looked at equations where there is exactly one solution. It is possible to have more than solution in other types of equations that are
More informationNondeterministic Streaming String Transducers
Nondeterministic Streaming String Transducers Rajeev Alur and Jyotirmoy V. Deshmukh Dept. of Computer and Information Science, University of Pennsylvania. {alur,djy}@cis.upenn.edu Abstract. We introduce
More informationCSCI3390-Lecture 16: NP-completeness
CSCI3390-Lecture 16: NP-completeness 1 Summary We recall the notion of polynomial-time reducibility. This is just like the reducibility we studied earlier, except that we require that the function mapping
More informationNondeterministic Finite Automata
Nondeterministic Finite Automata Not A DFA Does not have exactly one transition from every state on every symbol: Two transitions from q 0 on a No transition from q 1 (on either a or b) Though not a DFA,
More information1.3 Vertex Degrees. Vertex Degree for Undirected Graphs: Let G be an undirected. Vertex Degree for Digraphs: Let D be a digraph and y V (D).
1.3. VERTEX DEGREES 11 1.3 Vertex Degrees Vertex Degree for Undirected Graphs: Let G be an undirected graph and x V (G). The degree d G (x) of x in G: the number of edges incident with x, each loop counting
More informationLecture Notes on Inductive Definitions
Lecture Notes on Inductive Definitions 15-312: Foundations of Programming Languages Frank Pfenning Lecture 2 August 28, 2003 These supplementary notes review the notion of an inductive definition and give
More informationA Polynomial Time Algorithm for Parsing with the Bounded Order Lambek Calculus
A Polynomial Time Algorithm for Parsing with the Bounded Order Lambek Calculus Timothy A. D. Fowler Department of Computer Science University of Toronto 10 King s College Rd., Toronto, ON, M5S 3G4, Canada
More informationLecture #14: NP-Completeness (Chapter 34 Old Edition Chapter 36) Discussion here is from the old edition.
Lecture #14: 0.0.1 NP-Completeness (Chapter 34 Old Edition Chapter 36) Discussion here is from the old edition. 0.0.2 Preliminaries: Definition 1 n abstract problem Q is a binary relations on a set I of
More informationTuring Machines Part III
Turing Machines Part III Announcements Problem Set 6 due now. Problem Set 7 out, due Monday, March 4. Play around with Turing machines, their powers, and their limits. Some problems require Wednesday's
More informationDeterministic Finite Automata (DFAs)
Algorithms & Models of Computation CS/ECE 374, Fall 27 Deterministic Finite Automata (DFAs) Lecture 3 Tuesday, September 5, 27 Sariel Har-Peled (UIUC) CS374 Fall 27 / 36 Part I DFA Introduction Sariel
More informationMini Lecture 5.1 Solving Systems of Linear Equations by Graphing
Mini Lecture 5.1 Solving Systems of Linear Equations by Graphing 1. Decide whether an ordered pair is a solution of a linear system. 2. Solve systems of linear equations by graphing. 3. Use graphing to
More informationP P P NP-Hard: L is NP-hard if for all L NP, L L. Thus, if we could solve L in polynomial. Cook's Theorem and Reductions
Summary of the previous lecture Recall that we mentioned the following topics: P: is the set of decision problems (or languages) that are solvable in polynomial time. NP: is the set of decision problems
More informationDiscrete Basic Structure: Sets
KS091201 MATEMATIKA DISKRIT (DISCRETE MATHEMATICS ) Discrete Basic Structure: Sets Discrete Math Team 2 -- KS091201 MD W-07 Outline What is a set? Set properties Specifying a set Often used sets The universal
More informationf(x) x
2 Function 2.1 Function notation The equation f(x) = x 2 + 3 defines a function f from the set R of real numbers to itself (written f : R R). This function accepts an input value x and returns an output
More informationWeekly Activities Ma 110
Weekly Activities Ma 110 Fall 2008 As of October 27, 2008 We give detailed suggestions of what to learn during each week. This includes a reading assignment as well as a brief description of the main points
More informationCSE355 SUMMER 2018 LECTURES TURING MACHINES AND (UN)DECIDABILITY
CSE355 SUMMER 2018 LECTURES TURING MACHINES AND (UN)DECIDABILITY RYAN DOUGHERTY If we want to talk about a program running on a real computer, consider the following: when a program reads an instruction,
More informationChapter Five: Nondeterministic Finite Automata
Chapter Five: Nondeterministic Finite Automata From DFA to NFA A DFA has exactly one transition from every state on every symbol in the alphabet. By relaxing this requirement we get a related but more
More informationChapter 5 Simplifying Formulas and Solving Equations
Chapter 5 Simplifying Formulas and Solving Equations Look at the geometry formula for Perimeter of a rectangle P = L W L W. Can this formula be written in a simpler way? If it is true, that we can simplify
More informationHow do regular expressions work? CMSC 330: Organization of Programming Languages
How do regular expressions work? CMSC 330: Organization of Programming Languages Regular Expressions and Finite Automata What we ve learned What regular expressions are What they can express, and cannot
More informationHierarchy among Automata on Linear Orderings
Hierarchy among Automata on Linear Orderings Véronique Bruyère Institut d Informatique Université de Mons-Hainaut Olivier Carton LIAFA Université Paris 7 Abstract In a preceding paper, automata and rational
More informationcse303 ELEMENTS OF THE THEORY OF COMPUTATION Professor Anita Wasilewska
cse303 ELEMENTS OF THE THEORY OF COMPUTATION Professor Anita Wasilewska LECTURE 5 CHAPTER 2 FINITE AUTOMATA 1. Deterministic Finite Automata DFA 2. Nondeterministic Finite Automata NDFA 3. Finite Automata
More informationNP, polynomial-time mapping reductions, and NP-completeness
NP, polynomial-time mapping reductions, and NP-completeness In the previous lecture we discussed deterministic time complexity, along with the time-hierarchy theorem, and introduced two complexity classes:
More informationCMSC Discrete Mathematics SOLUTIONS TO FIRST MIDTERM EXAM October 18, 2005 posted Nov 2, 2005
CMSC-37110 Discrete Mathematics SOLUTIONS TO FIRST MIDTERM EXAM October 18, 2005 posted Nov 2, 2005 Instructor: László Babai Ryerson 164 e-mail: laci@cs This exam contributes 20% to your course grade.
More informationX-MA2C01-1: Partial Worked Solutions
X-MAC01-1: Partial Worked Solutions David R. Wilkins May 013 1. (a) Let A, B and C be sets. Prove that (A \ (B C)) (B \ C) = (A B) \ C. [Venn Diagrams, by themselves without an accompanying logical argument,
More informationComputational Models - Lecture 4
Computational Models - Lecture 4 Regular languages: The Myhill-Nerode Theorem Context-free Grammars Chomsky Normal Form Pumping Lemma for context free languages Non context-free languages: Examples Push
More informationNOTES ON AUTOMATA. Date: April 29,
NOTES ON AUTOMATA 1. Monoids acting on sets We say that a monoid S with identity element ɛ acts on a set Q if q(st) = (qs)t and qɛ = q. As with groups, if we set s = t whenever qs = qt for all q Q, then
More informationTopics in Complexity
Topics in Complexity Please evaluate this course on Axess! Your feedback really does make a difference. Applied Complexity Theory Complexity theory has enormous practical relevance across various domains
More informationCS311 Computational Structures. NP-completeness. Lecture 18. Andrew P. Black Andrew Tolmach. Thursday, 2 December 2010
CS311 Computational Structures NP-completeness Lecture 18 Andrew P. Black Andrew Tolmach 1 Some complexity classes P = Decidable in polynomial time on deterministic TM ( tractable ) NP = Decidable in polynomial
More informationSF2972 Game Theory Exam with Solutions March 15, 2013
SF2972 Game Theory Exam with s March 5, 203 Part A Classical Game Theory Jörgen Weibull and Mark Voorneveld. (a) What are N, S and u in the definition of a finite normal-form (or, equivalently, strategic-form)
More informationLecture #5. Dependencies along the genome
Markov Chains Lecture #5 Background Readings: Durbin et. al. Section 3., Polanski&Kimmel Section 2.8. Prepared by Shlomo Moran, based on Danny Geiger s and Nir Friedman s. Dependencies along the genome
More informationMatrices, Row Reduction of Matrices
Matrices, Row Reduction of Matrices October 9, 014 1 Row Reduction and Echelon Forms In the previous section, we saw a procedure for solving systems of equations It is simple in that it consists of only
More informationCISC4090: Theory of Computation
CISC4090: Theory of Computation Chapter 2 Context-Free Languages Courtesy of Prof. Arthur G. Werschulz Fordham University Department of Computer and Information Sciences Spring, 2014 Overview In Chapter
More informationPredicate Logic - Introduction
Outline Motivation Predicate Logic - Introduction Predicates & Functions Quantifiers, Coming to Terms with Formulas Quantifier Scope & Bound Variables Free Variables & Sentences c 2001 M. Lawford 1 Motivation:
More informationElementary realization of BRST symmetry and gauge fixing
Elementary realization of BRST symmetry and gauge fixing Martin Rocek, notes by Marcelo Disconzi Abstract This are notes from a talk given at Stony Brook University by Professor PhD Martin Rocek. I tried
More informationSource Coding. Master Universitario en Ingeniería de Telecomunicación. I. Santamaría Universidad de Cantabria
Source Coding Master Universitario en Ingeniería de Telecomunicación I. Santamaría Universidad de Cantabria Contents Introduction Asymptotic Equipartition Property Optimal Codes (Huffman Coding) Universal
More informationSimplify each numerical expression. Show all work! Only use a calculator to check. 1) x ) 25 ( x 2 3) 3) 4)
NAME HONORS ALGEBRA II REVIEW PACKET To maintain a high quality program, students entering Honors Algebra II are expected to remember the basics of the mathematics taught in their Algebra I course. In
More informationDeterministic Finite Automata (DFAs)
Algorithms & Models of Computation CS/ECE 374, Spring 29 Deterministic Finite Automata (DFAs) Lecture 3 Tuesday, January 22, 29 L A TEXed: December 27, 28 8:25 Chan, Har-Peled, Hassanieh (UIUC) CS374 Spring
More informationCSCI 2200 Foundations of Computer Science Spring 2018 Quiz 3 (May 2, 2018) SOLUTIONS
CSCI 2200 Foundations of Computer Science Spring 2018 Quiz 3 (May 2, 2018) SOLUTIONS 1. [6 POINTS] For language L 1 = {0 n 1 m n, m 1, m n}, which string is in L 1? ANSWER: 0001111 is in L 1 (with n =
More informationCYK Algorithm for Parsing General Context-Free Grammars
CYK Algorithm for Parsing General Context-Free Grammars Why Parse General Grammars Can be difficult or impossible to make grammar unambiguous thus LL(k) and LR(k) methods cannot work, for such ambiguous
More informationFinite Automata and Formal Languages TMV026/DIT321 LP4 2012
Finite Automata and Formal Languages TMV26/DIT32 LP4 22 Lecture 7 Ana Bove March 27th 22 Overview of today s lecture: Regular Expressions From FA to RE Regular Expressions Regular expressions (RE) are
More informationIntroduction to Automata
Introduction to Automata Seungjin Choi Department of Computer Science and Engineering Pohang University of Science and Technology 77 Cheongam-ro, Nam-gu, Pohang 37673, Korea seungjin@postech.ac.kr 1 /
More informationAnnouncements. Problem Set Four due Thursday at 7:00PM (right before the midterm).
Finite Automata Announcements Problem Set Four due Thursday at 7:PM (right before the midterm). Stop by OH with questions! Email cs3@cs.stanford.edu with questions! Review session tonight, 7PM until whenever
More informationUNIT-I. Strings, Alphabets, Language and Operations
UNIT-I Strings, Alphabets, Language and Operations Strings of characters are fundamental building blocks in computer science. Alphabet is defined as a non empty finite set or nonempty set of symbols. The
More informationHarvard CS 121 and CSCI E-121 Lecture 14: Turing Machines and the Church Turing Thesis
Harvard CS 121 and CSCI E-121 Lecture 14: Turing Machines and the Church Turing Thesis Harry Lewis October 22, 2013 Reading: Sipser, 3.2, 3.3. The Basic Turing Machine The Basic Turing Machine a a b a
More informationEquivalence of Regular Expressions and FSMs
Equivalence of Regular Expressions and FSMs Greg Plaxton Theory in Programming Practice, Spring 2005 Department of Computer Science University of Texas at Austin Regular Language Recall that a language
More informationNotes on Finite Automata
Notes on Finite Automata Turing machines are widely considered to be the abstract proptotype of digital computers; workers in the field, however, have felt more and more that the notion of a Turing machine
More informationCombinatorial models for DNA rearrangements in ciliates
University of South Florida Scholar Commons Graduate Theses and Dissertations Graduate School 2009 Combinatorial models for DNA rearrangements in ciliates Angela Angeleska University of South Florida Follow
More information1 Computational Problems
Stanford University CS254: Computational Complexity Handout 2 Luca Trevisan March 31, 2010 Last revised 4/29/2010 In this lecture we define NP, we state the P versus NP problem, we prove that its formulation
More information