arxiv: v1 [math.ds] 19 Feb 2016

Size: px
Start display at page:

Download "arxiv: v1 [math.ds] 19 Feb 2016"

Transcription

1 SIMULATION OF EFFECTIVE SUBSHIFTS BY TWO-DIMENSIONAL SUBSHIFTS OF FINITE TYPE NATHALIE AUBRUN AND MATHIEU SABLIK rxiv: v1 [mth.ds] 19 Feb 2016 Abstrct. In this rticle we study how subshift cn simulte nother one, where the notion of simultion is given by opertions on subshifts inspired by the dynmicl systems theory (fctor, projective subction...). There exists correspondence between the notion of simultion nd the set of forbidden ptterns. The min result of this pper sttes tht ny effective subshift of dimension d tht is subshift whose set of forbidden ptterns cn be generted by Turing mchine cn be obtined by pplying dynmicl opertions on subshift of finite type of dimension d+1 subshift tht cn be defined by finite set of forbidden ptterns. This result improves Hochmn s [Hoc09]. Introduction A subshift of dimension d is closed nd shift-invrint subset of A Zd where A is finite lphbet. A subshift cn be chrcterized by either its lnguge or by set of forbidden ptterns. With this lst point of view, the simplest clss is the set of subshifts of finite type, which re subshifts tht cn be chrcterized by finite set of forbidden ptterns. It is possible to pply dynmicl trnsformtions like fctor or projective subction on subshift of dimension d, nd it seems nturl to wonder how they modify the set of forbidden ptterns. In dimension 1, the clss of subshifts of finite type is well understood. In prticulr subshifts of finite type re exctly those whose lnguge is ccepted by locl utomton [Be93]. Given this result, we re nturlly interested in subshifts with lnguge given by finite utomton without the loclity condition. This clss is entirely chrcterized in terms of dynmicl opertions: it is the clss of sofic subshifts, which cn ll be obtined s fctor of subshift of finite type [LM95]. Thus ech sofic subshift is obtined by dynmicl trnsformtion of subshift of finite type. Multidimensionl subshifts of finite type re not well understood. For exmple, it is not esy to describe their lnguges. Moreover, in ddition to fctors, there exist other types of dynmicl trnsformtions on multidimensionl subshifts: for exmple subction of d-dimensionl subshift consists in tking the restriction of subshift to subgroup of Z d. Hochmn [Hoc09] showed tht every d-dimensionl subshift whose set of forbidden ptterns is recursively enumerble cn be obtined by subction nd fctor of d + 2- subshift of finite type. The min result of this rticle sttes tht ny effective subshift of dimension d cn be obtined from SFT of dimension d + 1, thnks to subction nd fctor opertion. This result improves Hochmn s [Hoc09] since our construction decreses the dimension. This problem is referenced in [Boy08] nd independently of this work there is solution t this problem in [DRS10]. The ide of the proof in [Hoc09] nd in this rticle is to construct T Finl, three dimensionl subshift of finite type in [Hoc09] (resp. two-dimensionl subshift of finite type in this pper), which relizes given effective subshift Σ A Z Σ in one direction (ssume tht d = 1) fter projection. Thnks to product opertion, T Finl is constituted by different lyers, the first one is constituted by the lphbet A Σ nd cn be obtined by projection π. Then finite type conditions ensure tht for ny x T Finl, one hs π(x) Z {(i,j)} Σ (resp. π(x) Z {i} Σ) nd ll these lines re equl; moreover conditions re not so restrictive nd ny configurtion of Σ cn be relized by configurtion of T Finl. We here briefly present the min ides of the proof, so tht the reder lredy hs in mind the finl gol of technicl constructions presented in this rticle. The difficulty is to ensure tht no forbidden pttern in Σ ppers. Since Σ is 2010 Mthemtics Subject Clssifiction. Primry 37B10, Secondry 37B50, 03D10. Key words nd phrses. Symbolic Dynmics, Multi-dimensionl shifts of finite type, Subction, Projective subction, Effectively closed susbhifts,turing mchines, Substitutive subshifts. 1

2 n effective subshift, its forbidden ptterns cn be enumerted by Turing mchine. There re clssicl techniques to simulte clcultions of Turing mchine thnks to finite type condition (see Section 2.6) nd the key point of these techniques is tht clcultions re embedded into finite computtion zones. Thus, we consider Turing mchine M Forbid which hs double role: it both enumertes the forbidden ptterns of Σ nd checks tht none of these ptterns pper in prticulr zone round ech computtion zone, clled the responsibility zone. However, when Turing mchine is constructed in two-dimensionl subshift of finite type, s in this rticle, computtion zones re such tht computtion is mde on frctured tpe (see Section 2.2). Consequently forbidden ptterns produced by M Forbid re lso written on frctured Z tpe, nd compring them with non frctured ptterns tht pper in A 2 Σ is not trivil. To do so, the mchine M Forbid clls for second Turing mchine M Serch (see Section 3.5). This mchine M Serch is given by M Forbid n ddress locted in its responsibility zone, nd nswers bck the letter of A Σ tht ppers t this ddress. If forbidden pttern is detected, the mchine M Forbid comes into specil stte q stop, whose presence is forbidden is the finl subshift. This ensures tht every row x Z {i} in the finl subshift is configurtion of Σ. So, the two finl opertions one hs to pply in order to obtin the subshift Σ consist first in tking the projective subction on Ze 1, where e 1 is the first vector of the cnonicl bsis of Z 2, nd then to erse ny informtion tht do not concern Σ for instnce the construction of computtion zones or the SFTs simulting the behviour of Turing mchines thnks to well-chosen letter-to-letter fctor. The difficulty of this construction presented in this pper is to progrm Turing mchines with different size of computtion which exchnge informtion in two-dimensionl subshift of finite type, similr rguments cn be found in [Dl74, Hn74, DLS01]. We note tht the uthors of [DRS10] prove similr result bsed on Kleene s fixed-point theorem. In tht other proof, they do not recourse to geometric rguments to describe the circultion of informtion between the different levels of computtion. The pper is orgnized s follows: in Section 1 we present five types of opertions (product, fctor, finite type, projective subction nd sptil extension) nd we formulte clssic results with this formlism. In Section 2, we present n importnt tool to define runs of Turing mchine with sofic subshift in dimension 2, which is the construction of n periodic SFT tht will contin clcultions of Turing mchine nd how to code communiction between those different clcultions of Turing mchine. These tools re used to prove our min result in Section 3. The min construction of the proof of Theorem 3.1 is built step by step nd for better understnding, t the end of ech of these subsections the contribution to the finl construction is summed up in fct. We do not pretend to give forml proof for these fcts, but we hope it will clrify our intention. 1. Subshifts nd opertions on them In this section we recll some bsic definitions on subshifts inspired from symbolic dynmics. We lso present some dynmicl opertions on subshifts, tht were first introduced by Hochmn [Hoc09] nd then developed by the uthors in [AS09] Tilings nd subshifts Let A be finite lphbet nd d be positive integer. A configurtion x is n element of A Zd. Let S be finite subset of Z d. Denote x S the restriction of x to S. A pttern is n element p A S nd S is the support of p, which is denoted by supp(p). For ll n N, we cll S d n = [ n; n] d the elementry support of size n. A pttern with support S d n is n elementry pttern. We denote by EA d = n N the set of A[ n;n]d d-dimensionl elementry ptterns. A d-dimensionl lnguge L is subset of EA d. A pttern p of support S Z d ppers in configurtion x if there exists i Z d such tht for ll j S, p j = x i+j, we denote p x. Definition. A co-tile set is tuple τ = (A, d, P ) where P is subset of EA d clled the set of forbidden ptterns. A generlized tiling by τ is configurtion x such tht for ll p P, p does not pper in x. We denote by T τ the set of generlized tilings by τ. If there is no mbiguity on the lphbet, we just denote it by T P. Remrk. If P is finite, it is equivlent to define generlized tiling by llowed ptterns or forbidden ptterns, the ltter being the usul definition of tiling. 2

3 One cn define topology on A Zd by endowing A with the discrete topology, nd considering the product topology on A Zd. For this topology, A Zd is compct metric spce on which Z d cts by trnsltion vi σ defined by: σa i : AZd A Zd x σa i (x) such tht σi A (x) u = x i+u u Z d. for ll i in Z d. This ction is clled the shift. Definition. A d-dimensionl subshift on the lphbet A is closed nd σ-invrint subset of A Zd. We denote by S (resp. S d, S d ) the set of ll subshifts (resp. d-dimensionl subshifts, d -dimensionl subshifts with d d). Let T A Zd be subshift. Denote L n (T) A [ n;n]d the set of elementry ptterns of size n which pper in some element of T, nd L(T) = n N L n(t) the lnguge of T which is the set of elementry ptterns which pper in some element of T. It is lso usul to study subshift s dynmicl system [LM95, Kit98], the next proposition shows the link between the two notions. Proposition 1.1. The set T A Zd is subshift if nd only if T = T L(T) c where L(T) c is the complement of L(T) in E d A. A set of ptterns P EA d is recursively enumerble if there exists n effective procedure for listing the ptterns of P (see for instnce [RJ87]). Definition. It is possible to define different clsses of subshifts ccording to the set of forbidden ptterns: For finite lphbet A nd dimension d N, the subshift T (A,d, ) = A Zd is the full-shift of dimension d ssocited to A. Denote FS the set of ll full-shifts (for every finite lphbet A nd dimension d). For finite lphbet A, dimension d N nd finite set P EA d, the subshift T (A,d,P ) is subshift of finite type. Denote SFT the set of ll subshifts of finite type. Subshifts of finite type correspond to the usul notion of tiling. For finite lphbet A, dimension d N nd recursively enumerble set P EA d, the subshift T P is n effective subshift. Denote RE the set of ll effective subshifts Opertions on subshifts In this section we describe five opertions on subshifts nd use them to define notion of simultion of subshift by nother one. Opertions re gthered in two groups depending on which prt the lphbet A or the group Z d of subshift T A Zd they modify Simultion of subshift by nother one An opertion op on subshifts trnsforms subshift or n-tuple of subshifts into nother one; it is function op : S S or op : S S S tht cn depend on prmeter. An opertion is not necessrily defined for ll subshifts. We remrk tht subshift T (resp. pir of subshifts (T, T )) nd its imge by n opertion op(t) (resp. op(t, T )) do not necessry hve the sme lphbet or dimension. Let Op be set of opertions on subshifts. Let U S be set of subshifts. We define the closure of U under set of opertions Op, denoted by Cl Op (U), s the smllest set stble by Op which contins U. We sy tht subshift T simultes subshift T by Op if T Cl Op (T). Thus there exists finite sequence of opertions chosen mong Op, tht trnsforms T into T. We note it by T Op T. Remrk tht Cl Op (T) = {T : T Op T} Locl trnsformtions We describe three opertions tht loclly modify subshift T A Zd. The new subshift resulting from the opertion will be subset of B Zd, where B is new lphbet. Product (Prod): Let T i A Zd i for ny i {1,..., n} be n subshifts of the sme dimension, define: Prod (T 1,..., T n ) = T 1 T n (A 1 A n ) Zd. One hs Cl Prod (FS) = FS nd Cl Prod (SFT ) = SFT. 3

4 Finite type (FT): These opertions consist in dding finite number of forbidden ptterns to the initil subshift. Formlly, let A be n lphbet, P EA d be finite subset nd let T AZd be subshift. By Proposition 1.1, there exists P such tht T = T P. Define: FT P (T) = T P P. Note tht FT P (T) could be empty if P prohibits too mny ptterns. By FT, one lists ll opertions on subshifts which re obtined by this type of trnsformtion. By definition of subshift of finite type, one hs Cl FT (FS) = SFT nd Cl FT (FS) = SFT. Fctor (Fct): These opertions llow to chnge the lphbet of subshift by locl modifictions. Let A nd B be two finite lphbets. A morphism π : A Zd B Zd is continuous function which commutes with the shift ction (i.e. σ i π = π σ i for ll i Z d ). In fct, such function cn be defined loclly [Hed69]: tht is to sy, there exists U Z d finite, clled neighborhood, nd π : A U B, clled locl function, such tht π(x) i = π(σ i (x) U ) for ll i Z d. Let π : A Zd B Zd be fctor nd T A Zd be subshift, define: Fct π (T) = π(t). By Fct, one lists ll opertions on subshifts which re obtined by this type of trnsformtion. Exmple 1.1 shows tht Cl Fct (SFT ) SFT. Exmple 1.1 (Cl Fct (SFT ) SFT ). Consider the lphbet {0, 1, 2} Z nd define T = T {00,11,02,21}. The fctor π such tht π(0) = π(1) = 0 nd π(2) = 2 trnsforms T into subshift: π(t) = {x {0, 2} Z : finite blocks of consecutive 0 re of even length } which is clled the even shift. It is known tht the even shift is not subshift of finite type (see Exmple of [LM95]), since one need to exclude rbitrrily lrge blocks of consecutive 0 s of odd lengths to describe it. Definition. A sofic subshift is fctor of subshift of finite type. Sofic = Cl Fct (SFT ). Thus, the set of sofic subshifts is In [LM95], it is shown tht sofic subshifts of dimension 1 re subshift which cn be defined with lnguge of forbidden ptterns which is regulr. The chrcteristion is unknown for multidimensionl sofic subshifts Trnsformtions of the group of the ction We describe n opertion tht modify the group on which the subshift is defined, thus we chnge the dimension of the subshift. Projective Subction (SA): These opertions llow to tke the restriction of subshift of A Zd ccording to subgroup of Z d. Let G be sub-group of Z d freely generted by u 1, u 2,..., u d (d d). Let T A Zd be subshift, define: { } SA G (T) = y A Zd : x T such tht i 1,..., i d Z d, y i1,...,i d = x i1u 1+ +i d u d. It is esy to prove tht SA G (T) is subshift of A Zd. One denotes by SA the set of ll opertions on subshifts which re obtined by this type of opertion. One verifies tht Cl SA (SFT ) SFT nd Cl SA (SFT ) Sofic (see respectively Exmple 1.2 nd Exmple 1.3). Exmple 1.2 (Cl SA (SFT ) SFT ). We construct subshift of finite type T {0, 1, 2} Z2 such tht the projective subction of T on the sub-group = {(x, y) Z 2 : y = x} Z 2 is not of finite type. In this exmple we wnt the subshift tht ppers on to be { x {0, 1, 2} Z : finite blocks of consecutive 0 s re of even length }. Define F the following set of llowed ptterns of size 4 (. symbol my be 1 or 2 but not 0, blnk symbol my be 0,1 or 2): 4

5 ; ; ; ; ; ; The lterntion of 1 nd 2 over nd under the digonl of 0 enbles us to control the prity of 0 blocks. Define F s the set of elementry ptterns of size 4 tht re not in F. Then if we denote T = T F : SA (T) = { x {0, 1, 2} Z : blocks of consecutive 0 s re of even length } which is not subshift of finite type s explined in Exmple 1.1. Exmple 1.3 (Cl SA (SFT ) Sofic). The non finite type subshift constructed in Exmple 1.2 is sofic, but it is possible to obtin non sofic subshifts. We construct subshift of finite type T such tht the projection SA (T) on the stright line y = x is not sofic. It is well known tht in dimension 1, sofic subshift re exctly subshifts whose lnguge see Definition 1.1 is regulr lnguge [LM95]. The lnguge { n b n : n N} is non-regulr nd so we construct subshift of finite type T A Z2 nd morphism π : A Z2 {0,, b} Z2 such tht the only llowed ptterns in T = π(t) contining finite blocks of consecutive s or b s re those of the form 2n 2n: 0... The principle is to construct ptterns of even size nd to loclize the center of these ptterns to distinguish the n prt from the b n prt. Denote A = {,, b, 0, 1, 2, 3, 4}. We construct squres formed by ny symbols except the symbol 0 which forms bckground.the symbols 1, 2, 3 nd 4 help to drw the two digonls of the squre nd to distinguish in which qudrnt we re. The symbol only ppers on digonl of the squre, nd the other digonl contins the n b n prt. The presence of the symbol 0 everywhere round finite figure ensures tht the two digonls cross in their middle, hence the figure pictured is squre. It is possible to describe finite set of ptterns where the only finite figures on the bckground formed by 0 s which re llowed re even size squres of the form: b... b b b ( )

6 We do not detil the entire set of llowed ptterns, but the reder cn esily deduce the missing ptterns from those given below: Squres center: 1 1 b 4 b b Squres digonls: b 1 b 2 b Squres sides: nd so on for the three other sides b b 0 b 2 0 Uniform domins: The only configurtions one cn construct with these llowed ptterns re configurtions of A Z2 with 0 everywhere except in some plces where there re rbitrrily lrge blocks of the form ( ), nd the configurtions mde of the infinite pttern ( ). We denote by T this subshift of finite type. Let π denote the letter-to-letter morphism defined by π(x) = 0 for x {, 1, 2, 3, 4} nd π() =, π(b) = b. Suppose tht SA (T) is sofic. Since Cl Fct (Sofic) = Sofic then π(sa (T)) would lso be sofic, which is bsurd since: π(sa (T)) = T {b;0m b n 0:m n}. So this construction proves tht Cl SA (SFT ) Sofic. The clss of SFT is not stble under projective subction nd the clss Cl SA (SFT ) is studied in [PS10]. Nevertheless stble clss for this opertion is known, it is the clss of effective subshifts. This follows from the fct tht projective subctions re specil cses of fctors of subctions, nd by Theorem 3.1 nd Proposition 3.3 of [Hoc09] which estblish tht symbolic fctors nd subctions preserve effectiveness. Tht is to sy Cl SA (RE) = RE. With this formlism, the result of M. Hochmn [Hoc09] cn be written: Cl Fct,SA (SFT ) = RE. More precisely, he proves tht Cl Fct,SA (SFT S d+2 ) S d = RE S d. In Theorem 3.1, we show tht Cl Fct,SA (SFT S d+1 ) S d = RE S d. Moreover, there re exmples of effective subshifts which re not sofic so Cl Fct (SFT S d ) = Sofic S d RE S d. 2. Computtion zones for Turing mchines In this section we explin how to construct computtion zones for Turing mchine nd how to use them to simulte clcultions. A Turing mchine is model of clcultion composed by finite utomton the hed of clcultion tht moves on n infinite tpe divided into boxes, ech box contining letter tht cn be modified by the hed. A precise definition of Turing mchine will be given in Subsection 2.1, nd it will be explined how to code the behviour of the mchine thnks to locl rules. The min problem is tht this SFT is not enough to code clcultions of the mchine, since there is no rule tht ensures the clcultion is well initilized. So we need to embed clcultions into specific zones. To mke sure tht the size of these computtion zones is not constrint nd does not premturely stop clcultion, we construct rbitrrily lrge computtion zones with sofic subshift in Subsection 2.2 nd we implement the locl rules of the Turing mchine in these zones in Subsection

7 2.1. Locl rules to code the behviour of Turing mchine In this rticle, we consider Turing mchines with some restrictions: the behviour of the mchine will be simulted only on the empty word (originlly the tpe only contins blnk symbols ). We lso ssume tht the hed cnnot go to the left of the initil position. Note tht we cn impose these restrictions without loss of generlity. First we recll the forml definition of Turing mchine. Remember tht Turing mchine is model of clcultion composed by finite utomton the hed of clcultion tht cn be in different sttes nd moves on n infinite tpe divided into boxes, ech box contining letter tht cn be modified by the hed. Definition. Let M = (Q, Γ,, q 0, δ, Q F ) be Turing mchine, where: Q is finite set of sttes of the hed of clcultion; q 0 Q is the initil stte; Γ is finite lphbet; / Γ is the blnk symbol, with which the tpe is initilly filled; end of ny enumerted word; δ : Q Γ Q Γ {,, } is the trnsition function. Given the stte of the hed of clcultion nd the letter it cn red on the tpe which thus depends on the position of the hed of clcultion on the tpe the letter on the tpe is replced or not by nother one, the hed of clcultion moves or not to n djcent box nd chnges or not of stte; F Q F is the set of finl sttes when finl stte is reched, the clcultion stops. Exmple 2.1. We consider the Turing mchine M ex tht enumertes on its tpe the words b, bb, bbb,... nd never hlts. This mchine uses the three letters lphbet {, b, } nd five sttes Q = {q 0, q +, q b+, q b++, q }. A seprtion symbol is written t the end of ech n b n. The trnsition function δ ex is δ ex (q 0, ) = (q b+,, ) δ ex (q b+, ) = (q, b, ) δ ex (q, ) = (q,,.) δ ex (q, ) = (q,, ) δ ex (q, b) = (q, b, ) δ ex (q, ) = (q +,, ) Initiliztion of the tpe: the mchine writes the first word b on the tpe nd plce the hed on the seprtion symbol to the right of the word. Suppose some word n b n is written on the tpe, nd tht the hed is on the symbol in stte q. The mchine looks for the rightmost symbol in n b n. δ ex (q +, b) = (q b++,, ) δ ex (q b++, b) = (q b++, b, ) δ ex (q b++, ) = (q b+, b, ) The mchine replces the leftmost symbol b by symbol nd looks for the seprtion symbol on the right of the word. Once it hs found it, it is replced by bb. The word n+1 b n+1 is now written on the tpe nd the hed is on the symbol in stte q. A clcultion of this mchine on n empty tpe will lwys go through the configurtions of the tpe represented in figure 1. If n origin is given it is strightforwrd to describe the behviour of Turing mchine with set of two-dimensionl ptterns. The first dimension stnds for the tpe nd second dimension for time evolution. We obtin the spce time digrm of computtion of M which cn be construct loclly by 3 2 llowed ptterns: If the pttern codes prt of the tpe on which the hed of clcultion does not ct, the two line of llowed pttern re identicl nd for x, y, z Γ one hs: x y z x y z If the hed of clcultion is present in the prt of the tpe coded, we code the modifiction given by the Turing mchine. For exmple the rule δ(q 1, x) = (q 2, y, ) will be coded by: (q 2, z) y z z (q 1, x) z 7

8 b (q b++, b) (q b++, b) b (q +, b) b b (q, ) b b b (q, b) b b b (q, b) b b b (q, b) b b b (q, ) b b b (q, ) b b b (q b++, ) (q b++, b) (q +, b) b (q, ) b b (q, b) b b (q, b) b b (q, ) b b (q, ) b (q b++, ) (q +, b) (q, ) b (q, b) b (q, ) b (q, ) (q 0, )... Figure 1. A clcultion of this mchine on n empty tpe will lwys go through the configurtions of the tpe. Denote by P M the set of forbidden ptterns on the lphbet A M = Γ (Q Γ) constructed ccording to the rules of M ptterns tht cnnot be seen s coming from the trnsition function s bove. We cn ssume tht the support of ll ptterns in P M hve the following type: ssumption the rule δ(q 1, x) = (q 2, y, ) becomes: y (q 2, z) z (q 1, x) z t z (q 1, x) z (q 1, x) z z. For exmple, with this Consider now the subshift of finite type T PM. It contins n element tht is exctly the spce time digrm of computtion of M, but lso mny other elements tht re inconsistent. With the Turing mchine M ex of Exmple 2.1, the SFT T PMex contins n element where the following configurtion of the tpe ppers b b b b b (q, ) but this configurtion is inconsistent since it is never reched by clcultion of M ex. The problem comes from the lck of informtion bout the beginning of clcultion. We need to specify point in Z 2 tht stnds for the origin of clcultion the hed of clcultion is in the initil stte q 0, nd the row is filled with blnk symbols. By compctness of the set of configurtions of subshift, it is impossible to impose tht specil symbol ppers exctly once in every configurtion A substitutive sofic subshift s grid of computtion A clssicl problem in tiling theory is the construction of periodic tilings, tht re sets of tiles tht cn only produce periodic configurtions. A first exmple ws initilly given by Berger, who proved tht the domino problem (is it possible to tile the whole plne with given finite set of tiles?) is undecidble (see [Ber66] for the originl proof by Berger nd [Rob71] for Robinson s proof with smller set of tiles). Robinson reduces this problem to the Turing mchine hlting problem, which is known to be undecidble. The hert of the proof is the construction of n periodic tiling, which codes computtion zones for Turing mchines. These computtion zones re ll finite, but for ny clcultion of Turing mchine tht stops, it is possible to find zone lrge enough tht contins it. Robinson entirely describes finite set of tiles tht produces the tiling, but there re mny techniques to obtin it: Mozes [Moz89] gives proof bsed on substitutions nd 8

9 Durnd, Romshchenko nd Shen [DRS08] propose proof bsed on Kleene s fixed point theorem. We here define computtion zones for Turing mchine with two dimensionl substitution. Definition of the substitution s Grid. Let A be finite lphbet. A (k, k )-two dimensionl substitution is function s : A A U k,k where U k,k = [0, k 1] [0, k 1]. We nturlly extend s to function s n,n : A U n,n A U nk,n k by identifying A U nk,n k with (A U k,k ) U n,n. Strting from letter plced in (1, 1) Z 2 nd pplying successively s, s k,k,..., s kn 1,k n 1 we obtin sequence of ptterns in A U k i,k i for i {0,..., n}. Such ptterns re clled s-ptterns. Note tht the substitutions s we define here re deterministic but one cn imgine non deterministic substitutions replcing the function s by set of substitution rules, where letter my hve different imges by the substitution. The definition of s-ptterns nturlly extends to non deterministic substitutions. To describe the grid of computtion, we consider two lphbets G 1 nd G 2 (see Figure 2). The lphbet G 1 = {,,, } describes the zones of computtion,, nd re clled computtion boxes where the computtion holds nd re clled communiction boxes through which computtion boxes cn send informtion. More precisely, nd re clled border computtion boxes. The lphbet G 2 is constituted by lines which describe communiction chnnels between the different zones of computtion. G 2 G 1 Figure 2. The lphbets G 1 nd G 2 on which the substitution is defined. We define two (4, 2)-two dimensionl substitutions, s 1 on G 1 nd s 2 on G 2 (see Figure 3 for the substitution rules). Then, we define the product substitution s Grid = s 1 s 2 on G 1 G 2. Itertions of s Grid on ny pttern of G 1 G 2 produce rbitrrily lrge computtion zones with communiction chnnels between them (this will be detiled in Section 2.4 nd Section 2.7). See Figure 4 for n exmple of n itertion of s Grid. Figure 3. Bsic elements to define the substitution rules of s. The first row lists the substitution rules of s 1 on the lphbet G 1. The second nd third rows contin substitution rules of s 2 on some of the letters of G 2. All substitution rules of s 2 on G 2 cn be obtined by superimposing substitution rule of the second row nd substitution rule of the third row. One cn deduce substitution rules of s Grid on the lphbet G 1 G 2 by superimposing rule of s 1 on G 1 nd rule of s 2 on G 2. 9

10 Figure 4. Four itertions of the substitution s Grid strting from n element of G 1 G 2. We denote by π G1 (resp. π G2 ) the projection on G 1 (resp. G 2 ). Sofic subshift generted by the substitution. Given substitution s, recll tht s-pttern is pttern obtined by itertion of the substitution s on letter (for instnce in Figure 4 re drwn s-ptterns obtined fter four itertions on the letter ). The subshift generted by substitution s, denoted T s, is the set of configurtions x such tht ny pttern tht ppers in x lso ppers in s-pttern. S. Mozes studied more generl substitutions non deterministic ones nd substitution rules my be of different sizes nd proved tht if the substitution s stisfies some good property nd hs only strictly two-dimensionl substitution rules, then T s is sofic subshift (see Theorem 4.1 of [Moz89]). In prticulr Mozes theorem cn be pplied for ll deterministic substitutions, tht is to sy tht ll letter hve only one imge, like s Grid. As consequence, the following holds Fct 2.1. The subshift generted by s Grid, { } T Grid = T sgrid = x (G 1 G 2 ) Z2 : for ll u x there exists n N such tht u s n Grid( ) is two-dimensionl sofic subshift. Remrk. Note tht π G1 (T Grid ) = T s1 nd π G2 (T Grid ) = T s2 but T Grid is different of T s1 T s2. A substitution s : A A U k,k my be extended into n ppliction s : A Z2 A Z2. This substitution hs unique derivtion if for every element x T s there exists n unique y A Z2 nd n unique i U k,k such tht s(y) = σ i (x). Since the pttern ppers in ech rules of the substitutions s 1, for every configurtion x T s1, there exists (i, j) [0, 3] [0, 1] such tht x {n1+i+1} [n 2+j+1,n 2+j+2] = for ll (n 1, n 2 ) N N. Moreover this pttern cnnot pper in other position so (i, j) is chosen in n unique wy. Consider the plne prtition ([n 1 + i, n 1 + i + 3] [n 2 + j, n 2 + j + 1]) (n1,n 2) N N of the configurtion x, since ll boxes hve different imge by the substitution, this plne prtition gives n unique ntecedent y by s 1. We deduce tht s 1 (y) = σ i,j (x). Thus T s1 hs unique derivtion. The sme type of resoning holds for s 2. Fct 2.2. The substitutions s 1 nd s 2 hve unique derivtion Use of communiction chnnels A communiction chnnel is sequence of djcent boxes mrked by specil symbol we cll these mrked boxes chnnel boxes. The chnnel begins nd ends with two computtion boxes. In our construction, the chnnel boxes re of two types which cn pper in the sme box: communiction boxes from lphbet G 1 tht will be used for internl communiction nd communiction between djcent Turing mchines; symbols from lphbet G 2 tht will be used for communiction between non djcent Turing mchines. A trnsfer of informtion consists in three objects (see Figure 5): n initil computtion box denoted i nd finl computtion box denoted f 10

11 i c f Figure 5. A communiction chnnel denoted c between the computtion boxes i nd f. locl rules tht determine the symbol trnsferred through chnnel, depending on the direction of the chnnel strting from i (resp.reching f) nd the symbol contined in the box i (resp. in the box f) communiction chnnel c. Two djcent communiction boxes crry the sme symbol, which is trnsferred through the chnnel. Note tht the computtion boxes i nd f re not necessry identicl for exmple rule locl my mke chnge t the end of the communiction chnnel. The sme computtion box my be t the extremity of different communiction chnnels. Note tht communiction box my belong to multiple communiction chnnels, but this number must be bounded in our construction the mximum number of chnnels going through communiction box will be 3 internl communiction inside computtion zone, communiction between two djcent computtion zones of sme level nd communiction between computtion zones of different levels. Fct 2.3. Given subshift Σ tht contins communiction chnnels, it is possible to code trnsfers of informtion through these chnnels thnks to product nd finite type opertions, provided the symbols trnsferred loclly depend on the symbol contined in the initil nd finl computtion boxes of the chnnel Description of computtion zones In this section we only consider the G 1 prt of the sofic subshift T Grid. We here describe the grid where computtions hold for n element of π G1 (T Grid ): horizontl dimension stnds for the tpe nd verticl dimension for time evolution. On horizontl line, zone of computtion is constituted by group of computtion boxes locted between on the left nd on the right. The size of computtion zone is the number of computtion boxes which constitute the zone. Consider configurtion x T Grid nd computtion zone in x. Since s 1 hs unique derivtion (see Fct 2.2) for ny integer n, there exists unique wy to prtition x into 4 n 2 n rectngles so tht ech of these rectngles is s n 1 () for some G 1. So there exists miniml integer n such tht the computtion zone of x ppers in s n 1 () for some G 1. We cll this integer the level of the computtion zone (see Figure 6). At the itertion n of the substitution on, tht is to sy s n ( ), we obtined rectngle of size 4 n 2 n. By induction, for ll m [1, n], we get 4 n m 2 n m = 8 n m zones of computtion of level m in s n ( ), the size of these zones of computtion is 2 m. More precisely, if on the line j [0, 2 n 1] of s n ( ) we find zone of computtion of level m, then in this line we hve 4 n m zones of computtion of level m. Moreover for ech computtion box locted t the coordinte (i, j), the next computtion box in the sme column bove the current one is seprted by 2 m 1 communiction boxes, so it is locted t the coordinte (i, j + 2 m ), nd this computtion box is in zone of computtion of level m t the sme plce tht the box t the position (i, j). There is the sme phenomen if we look down. The set of zones of computtion of the sme size 2 m on verticl line is clled strip of computtion of size 2 m. For ny other symbol G 1, the description is the sme except for the bottom row. Remrk. Note tht it is possible to hve symbol on row with no symbol on its right tht is to sy n infinite computtion zone. In this cse the computtion zone hs n infinite level. 11

12 Figure 6. Four itertions of the substitution s Grid. Computtion zones of level 1,2 nd 3 pper on the lst pttern. The computtion boxes of the first (resp. second nd third) level re pictured with plin (resp. hshed with SW-NE lines nd hshed with NW-SE lines) pttern. Fct 2.4. Consider x T Grid nd C n computtion zone of level n of x. We ssume tht C n ppers in the i th row of x, nd we denote this row by x Z {i}. Then the following properties hold remember tht in this section we only consider the G 1 prt of the subshift T Grid : (1) C n contins 2 n computtion boxes, seprted by communiction boxes; (2) on x Z {i} there re only computtion zones of level n, seprted by 2 2n 1 communiction boxes; (3) the row x Z {i} is repeted verticlly every 2 n rows, tht is to sy x Z {i} = x Z {i+k 2 n } for ny integer k Z; (4) verticlly, between every pir of consecutive computtion boxes of x Z {i} nd x Z {i+k 2n }, there re only 2 n 1 communiction boxes. We now explin how it is possible for two computtion boxes of the sme computtion zone nd for two djcent strips to communicte. Communiction inside strip. Two computtion zones in the sme computtion strip of level n communicte thnks to communiction boxes of the 2 n 1 intermedite rows (verticl trnsfer of informtion), nd inside sme computtion zone communiction between computtion boxes occurs on the 2 4 n 1 2 n communiction boxes (horizontl trnsfer of informtion). Figure 7 represents computtion grid where ll zones of computtion of the sme size shre the sme color nd re filled with the sme pttern. Communiction between two djcent strips. Two strips of computtion of sme level cn lso communicte if they re djcent tht is the leftmost computtion box of the first strip nd the rightmost computtion box of the second strip re only seprted by communiction boxes. Fct 2.5. Communiction boxes contin two communiction chnnels horizontl nd verticl chnnels. Thnks to these chnnels, computtion boxes into sme strip nd two djcent strips cn communicte Initiliztion of clcultions : the clock The computtion strips described in the previous section re restricted in spce but not in time, hence inconsistent configurtions of Turing mchine my pper. To solve this problem, we equip ech computtion strip with clock, tht will be reinitilized periodiclly. At ech step of clcultion, the clock is incresed nd when it is reinitilized, the Turing mchine strts new clcultion. We use four elements lphbet C = {0, 1,, } to construct sofic subshift T Clock obtined by dding finite type rules on Prod Ä T Grid, C Z2ä, where T Grid is the sofic subshift described in Section 2.2. Denote π C the projection on the second coordinte. The clock is ctully finite utomton tht simultes binry ddition modulo 2 2n on 2 n boxes tpe specil symbol corresponds to the crry in binry ddition, nd symbol is used to synchronize djcent computtion zones of sme level. To prevent the ppernce of inconsistent sttes on the clock, we forbid the ptterns 0, 1, 0, x nd x where x {0, 1, } we cll this finite type condition Consist. 12

13 Figure 7. Computtion grid with the communiction between disconnected prts of the sme computtion zone. Computtion zones of level 1,2 nd 3 re pictured with three different colors nd ptterns. On given row there re only computtion zones of the sme level, nd there re 2 n rows between two rows with level n computtion zones. A row of strip of computtion of level n is mde of 2 n boxes rrnged into 2 4 n 1 wide block of boxes. The two wys of communiction (horizontl nd verticl) re pictured with rrows whose color corresponds to the level of the computtion zone or strip Figure 8. On the left, n exmple of the evolution of the clock for computtion zone of size 2 2. On the middle the evolution of prt of this clock on level 2 computtion strip: on the tpe re successively written 001, 0011, 01 nd And on the right, some of the finite type conditions Count, represented by the llowed ptterns, dded to the sofic subshift T Grid to obtin the sofic subshift T Clock. We describe the finite type conditions Count on the lphbet G 1 C in Figure 8. The clocks of different computtion levels evolve ccording to the rules described in Figure 8, nd when symbol reches the left most computtion box, it is reinitilized. Before reinitiliztion, the clock psses through the configurtion with only symbols on the tpe. Thnks to this configurtion, it is possible to synchronize clock on strip of level n with its two neighbours of level n. For exmple the clock for computtion strip of level 1 will be 00, 01, 1, 11,,, 00,... Hence clock for computtion strip of level n is reinitilized fter 2 2n + 2 steps. To these locl rules we dd nother finite type condition clled Synchro, tht ensures tht clocks corresponding to computtion zones on the sme level re synchronized, tht is they re in the sme stte t every clcultion step on sme row, ll the clocks re in the sme stte. This cn be esily done by the 13

14 following wy: clock is in the configurtion only when its left nd right neighbours re in the sme configurtion signl crrying symbol is sent through communiction chnnel between neighbours. We thus obtin sofic subshift T Clock = FT Count Consist Synchro Ä Prod Ä TGrid, C Z2ää in which every computtion strip of T Grid is now equipped with clock. Note tht we do not impose clocks for different levels of computtion zones to be somehow synchronized. Fct 2.6. Consider the sofic subshift T Clock, in the interior of strip of computtion of level n which is of size 2 n, the clock is initilized every 2 2n + 2 on computtion zone of level n A sofic subshift to describe Turing mchines behviour We re going to use the subshift T Clock constructed in Section 2.5 to construct sofic subshift where the computtion of M in spce 2 n holds on ech strip of computtion of size 2 n, for ll n N. We wnt to pply the rules of P M to djcent computtion boxes tht my be seprted by sequel of communiction boxes. As explined in Section 2.3 informtion my be trnsferred through communiction boxes horizontlly nd verticlly. The spce of computtion of M is restricted by on the left nd by on the right. We strt gin with the sofic subshift T Clock defined in Section 2.5, into the product subshift Prod Ä T Clock, ÃZ2ä where à = A M (A M A M A M ). A symbol in à my be either symbol of A M inside computtion box or three symbols of A M trnsferred horizontlly for the first nd the second nd verticlly for the third through communiction box. We hve defined π G1, π G2 nd π C respectively the projections on G 1, G 2 nd C in the first coordinte of Prod Ä T Clock, ÃZ2ä. Moreover denote πã the projection on the second coordinte of Prod Ä T Clock, ÃZ2ä, if we re in communiction box, we cn write πã1, πã2 nd πã3 respecively for the first, second nd third coordinte of A M A M A M. To the sofic-subshift Prod Ä T Clock, ÃZ2ä, we dd the following finite conditions, the support of ll forbidden ptterns hve the following form: The conditions re: b c d e with, b, c, d, e G 1 G 2 C à if the center box corresponds to communiction box in T Clock, tht is to sy π G1 (c) =, one uses conditions Trnsfer: the first nd second coordintes re constnt long the centrl row, nd the third coordinte is constnt long the centrl comlumn more precisely πã1 (b) = πã1 (c) = πã1 (d), πã2 (b) = πã2 (c) = πã2 (d) nd πã3 () = πã3 (c) = πã3 (e), these conditions hold if ll boxes in the neighborhood re communiction boxes, in fct, if there is computtion box, we just use the projection πã; if the center box corresponds to computtion box in T Clock, tht is to sy π G1 (c) {,, }, one uses one of the followings conditions: conditions Init: when the clock is in initil stte, there is the blnk symbol on ech box nd the tpe is in the initil stte on the left computtion box more precisely if π C (c) = nd π G1 (c) = then πã(c) = πã1 (d) = πã2 (b) = πã3 () = (q 0, ), if π C (c) = nd π G1 (c) {, } then πã(c) = πã1 (d) = πã2 (b) = πã3 () = ; conditions Comp: we use the rules described in P M if the clock is not in the initil stte more precisely if π C (c) nd π G1 (c) = then πã3 () πã1 (b) πã(c) πã2 (d) P M, πã(c) = πã2 (b) = πã1 (d) nd πã(c) = πã3 (e), if π C (c), π G1 (c) = nd the third coordinte of δ(πã(c)) is different from, tht is to sy the trnsition function of the Turing mchine does not move the hed towrd 14

15 the left, then πã3 () πã(c) πã2 (d) P M, πã(c) = πã2 (b) = πã1 (d) nd πã(c) = πã3 (e), if π C (c), π G1 (c) = nd the third coordinte of δ(πã(c)) is different from, tht is to sy the trnsition function of the Turing mchine does not move the hed towrd the right, then πã3 () πã1 (b) πã(c) P M, πã(c) = πã2 (b) = πã1 (d) nd πã(c) = πã3 (e); conditions Bound: if the hed wnts to go to the left of the computtion box or to the right of the computtion box, the hed reches specil stte nd the computtion continues in n infinite loop until the computtion is initited by the clock more precisely if π C (c), π G1 (c) = nd the third coordinte of δ(πã(c)) is, then q Wit πã(c) πã2 (d), π Ã (c) = π Ã 2 (b) = πã1 (d) nd πã(c) = πã3 (e); if π C (c), π G1 (c) = q Wit nd the third coordinte of δ(πã(c)) is, then πã1 (b) πã(c), π Ã (c) = π Ã 2 (b) = πã1 (d) nd πã(c) = πã3 (e); if π C (c), π G1 (c) {,, } nd πã = q Wit, then πã(c) = πã3 () = πã3 (e) = πã2 (b) = πã1 (d) = q Wit, if π C (c) nd πã1 (b) = q Wit or πã2 (d) = q Wit then πã(c) = q Wit. Define the sofic subshift T M : T M = FT Trnsfer Init Comp Bound Ä Prod Ä TClock, ÃZ2ää. For more convenience, we gther the locl rulesätrnsfer, Ä Init, Comp nd Bound in Work M, nd the construction is summed up by: T M = FT WorkM Prod TGrid, AComp(M)ää Z2 for ny Turing mchine M. On ech strip of computtion ppers prts of the spce time digrm of the clcultion of M on the empty word. Ech prt of these spce time digrms re limited in spce by the size of the strip of computtion nd the number of steps is bounded exponentilly by the length of the strip. Thus we cn find in T M rbitrry lrge prt of spce time digrm of M. Fct 2.7. The subshift T M contins ll clcultions of the Turing mchine M on spce time digrm of size 2 n ( 2 2n + 2 ) 2 n boxes tpe nd 2 2n + 2 steps of clcultion strting with n empty entry word. Exmple 2.2. In this exmple the Turing mchine M ex strts its enumertion with the word b. The picture describes how run is coded on computtion grid. If one only considers computtion boxes of level 2, they form three by four computtion zone (three steps of clcultion on four boxes tpe) Communiction chnnels between Turing mchine of different levels In the sequel computtion strips will need to communicte. For two strips of the sme level communiction it is esy since between two zones of computtion of djcent strips of level n, there re only communiction boxes. Then one bit of informtion cn be exchnged between two djcent strips of level n t ech step of clcultion (see Section 2.4). But if the two strips re not of the sme level the problem is not s simple. We present in this section communiction grid tht llows strip of level n to communicte with strip of level n 1 nd strip of level n + 1. This communiction grid is bsed on the G 2 prt of the subshift T Grid. The lines obtined with the lphbet G 2 re clled communiction lines. Communiction between computtion zones of different levels re mde through these lines. Under the ction of s 2, communiction lines form rectngles. The two rectngles obtined fter n itertion of n element of G 2 re clled communiction rectngles of level n. Ech rectngle of level n intersects two rectngles of level n 1 nd it is intersected by rectngle of level n

16 b b (q, ) (q, ) (q 0, ) (q 0, ) (q 0, ) (q 0, ) (q 0, ) Figure 9. Clcultion of Turing mchine on computtion grid with computtion zones of levels 1, 2 nd 3. Remrk tht ech or rrow ctully crries symbol, but for more redbility they re not pictured here. For the sme reson the clock is lso omitted. If we consider border computtion box (resp. ) in computtion zone of level n, it is inside communiction rectngle of level n. Thus if we go horizontlly on the left (resp. the right) of this box we meet the left border (resp. the right border) of this rectngle. On the bottom nd top lines of this rectngle, we encounter two border computtion boxes ( nd ) which re in two different computtion zones of level n 1. By locl rules it is possible to construct communictions chnnel of level n, tht strt from ech border computtion box ( or ) of level n. The chnnel of communiction goes on horizontlly on the right nd left brnches until it meets the right or left border of communiction rectngle which is necessry of level n. Then the chnnel goes up nd follows the border of the rectngle until it meets border computtion box. This box is necessrily of level n 1. Thus computtion zone cn communicte with the four computtion zones of the previous level which re included in itself (see Figure 10). These chnnels re used in Section 3.5 to ensure communiction between computtion zones of different levels. We remrk tht zones of level n repet verticlly with hlf the frequency of level n 1 zones. Therefore hlf the level n 1 zones do not incoming pth from higher zones. Figure 10. A computtion grid with communiction lines. The computtion zone of level 3 communictes with level 2 computtion zones it contins. This communiction is mde through the level 3 communiction rectngle inside which the left border computtion box is. Symmetriclly, one cn imgine tht the right border communiction box communictes with two other level 2 computtion zones, this in not pictured here. 16

17 Fct 2.8. For ny computtion strip of level n, there re two communiction chnnels strting from ech border computtion box or of level n nd ending t border computtion box of level n 1 one nd one. Strting from computtion zone of level n, the four computtion strips of level n 1 ssocited cn be reched by this wy. 3. Proof of the min theorem The ides of the proof of the min result of this rticle were presented in the Introduction. We give here technicl detils tht rely on constructions presented in the previous sections. We wnt to prove the following result. Theorem 3.1. Any effective subshift of dimension d cn be obtined with fctor nd projective subction opertions from subshift of finite type of dimension d + 1. Thnks to the formlism of Section 1 nd since RE is stble under Fct nd SA opertions, we rewrite it: Cl Fct,SA (SFT S d+1 ) S d = RE S d. This result improves Hochmn s [Hoc09] since our construction decreses the dimension. We here prove this sttement in the prticulr cse d = 1, but the proof cn be esily extended to ny dimension. Let Σ be one dimensionl effective subshift, defined on n lphbet A Σ Construction of the four lyers of SFT Z We strt with the two-dimensionl fullshift A 2 Σ with sptil extension opertion, nd thnks to fctor, product nd finite type opertions we construct sofic subshift T Finl such tht fter fctor nd projective subction we obtin Σ. To do tht, we eliminte configurtions x such tht x Z {0} contins forbidden word of Σ. Then the projective subction tht consists in only keeping the first coordinte of two-dimensionl configurtion x gives the subshift Σ. To resume the two-dimensionl sofic subshift is mde of four lyers tht re glued together thnks to product opertions: first lyer contins A Z2 Σ nd ll horizontl lines re identicl by finite condition Align, the other lyers force the horizontl line to be n element of the effective subshift Σ, thus this subshift cn be obtined fter projective subction (to keep horizontl line) nd fctor (to keep the first lyer); lyer 2 contins the computtion zones for Turing mchines equipped with the clock (this construction is described in Section 2), tht will be used by both mchines M Forbid nd M Serch ; but lso the communiction chnnels tht will be used by the sme mchines to send requests (see Sections 3.4 nd 3.5); lyer 3 is devoted to Turing mchines M Forbid, nd communiction with the Turing mchines M Serch (this prt is described in Section 3.4); lyer 4 is devoted to Turing mchines M Serch nd internl communiction between these mchines (see Section 3.5). Of course ech of this lyer depends on the others (for exmple lyer 3 uses computtion zones given by lyer 2), nd the dependences re coded thnks to finite type opertions Addresses in strip Since, on the first lyer, ech column is formed by one letter of A Σ, to check word in n horizontl configurtion, it is sufficient to check the first lyer in the corresponding columns. Let C n be computtion zone of level n of n element x T Grid nd let S n be the computtion strip ssocited. By Fct 2.2, there exists n unique i [0, 4 n 1] [0, 2 n 1] nd n unique y T Grid such tht s n Grid(y) = σ i (x) so there exists n unique (j 1, j 2 ) Z 2 such tht C n s n Grid(y (j1,j 2)). One hs S n σ i (s n Grid(y {j1} Z})) x, the strip σ i (s n Grid(y {j1} Z})) is the dependency strip ssocited with the computtion strip S n In T Grid the tpe of Turing mchine in strip of level n is frctured. Thus Turing mchine of level n cnnot view ll columns which re in its ssocited dependency strip. To get this informtion, this Turing 17

18 Figure 11. Four lyers in the finl construction. mchine communictes with Turing mchine of lower level (see Section 3.5) but both mchines need to precisely identify column. Given dependency strip ssocited with computtion strip of level n, it is possible to describe the coordinte reltive to this strip of ny column of the dependency strip by n ddress which contins n letters in four elements lphbet. Ech s n 1 () is horizontlly decomposed into four (possibly different) s n 1 1 (b) where, b G 1. The first letter of the ddress indictes in which of these dependency stripes of size n 1 the column is locted. By itertion of this process the position of column is exctly given with n letters (see Figure 12). s n s n 2 s n 3 Figure 12. Addresses of two boxes inside dependency strip ssocited with computtion zone of level 3. The ddress of the column of the blck box is 231 nd for the grey box, the ddress of the column is 020. Fct 3.2. For every dependency strip ssocited with computtion strip of level n, it is possible to describe the position of ny column by n ddress of length n on four elements lphbet Responsibility zones On ech computtion zone Turing mchine mkes clcultions. The Turing mchine M Forbid described more precisely in Section 3.4 enumertes ptterns nd then checks tht these ptterns never pper. Since it tkes n infinite number of steps of clcultion to check tht one pttern does not pper in the entire configurtion, ech Turing mchine M Forbid only checks finite zone. The finite zone in which the mchine ensures tht no forbidden pttern it produces ppers is clled the responsibility zone of the mchine. We thus ssocite responsibility zone with ech strip of computtion. For strip of level n this responsibility zone is 3 (2 4 n 1 ) = 6 4 n 1 wide nd centered on the strip (see Figure 13), so tht the 18

19 responsibility zone of strip strts t the end of the strip of sme level on its left nd ends t the beginning of the strip of sme level on its right. Figure 13. Responsibility zones for strips of level 2. These zones re 24 boxes wide nd overlp on 8 boxes. The responsibility zone of the center strip strts t the end of the strip on its left nd ends t the beginning of the strip on its right. Responsibility zones defined in this wy overlp: two djcent responsibility zones of sme level n shre 2 4 n 1 boxes. These overlppings re essentil: if they did not exist, one cn imgine tht forbidden pttern not entirely included in ny responsibility zone would not be detected. Moreover the non bounded size of overlppings ensures tht ny pttern is inside n infinite number of responsibility zones of incresing levels Genertion nd detection of forbidden ptterns by M Forbid Since Σ is recursively enumerble, there exists Turing mchine tht enumertes the forbidden ptterns of Σ. We here describe modified version of this Turing mchine tht lso checks tht no forbidden pttern ppers inside its responsibility zone, on the first level of the construction A Σ Z 2. Computtion zones re not connected (see Figure 9), so clcultion of M Forbid on strip of computtion of size 2 n cnnot ccess entirely its responsibility zone. The mchine M Forbid needs the help of second Turing mchine M Serch to obtin the ptterns of A Σ Z written in its responsibility zone. The behviour of M Forbid is the following: it enumertes s mny forbidden ptterns s the size of the computtion zone llows, nd ech time such pttern is generted, M Forbid checks tht it does not pper in its responsibility zone. Tpes of M Forbid. The mchine M Forbid uses three tpes: the first tpe is the clcultion tpe; the second tpe is writing tpe, where the forbidden ptterns re successively written; the lst tpe is the communiction tpe nd contins successively the ddresses of letters from lphbet A Σ needed by M Forbid to check no forbidden pttern ppers inside its responsibility zone; M Forbid wits for the required M Serch mchine of its neighbourhood (left, middle or right mchine) to be vilble, then sends it the ddress of the letter it wnts to ccess (see Section 3.5). Detection of the size of the responsibility zone ssocited. First, the Turing mchine M Forbid detects the size of the computtion zone between nd. Thus, M Forbid knows the size of its responsibility zone. This cn be in liner time ccording to the size of the computtion zone considered. Enumertion of forbidden ptterns. Then, M Forbid enumertes forbidden ptterns nd ech time it encounter one, it checks if this forbidden pttern ppers in the ssocited responsibility zone before to enumerte the following one. 19

20 Check of the responsibility zone. Assume tht the mchine M Forbid hs written on its writing tpe forbidden pttern f = f 0 f 1... f k 1. Assume tht M Forbid must check responsibility zone of level n denoted n 1 1. It sks M Serch for the first letter in its responsibility zone 0 (the principe of request is explined in Section 3.5), nd compres it with f 0. If the letters coincide, then it is still possible tht f ppers in position 0 in the responsibility zone, so the comprison of the two ptterns f nd 0... k continues. If f 0 0 then we re sure tht f does not pper t this loction. If f = 0... k, the Turing mchine M Forbid stops its computtion nd enter in stte which sys tht forbidden ptterns ppers in the checked configurtion. This stte will be forbidden in the finl subshift of finite type. When the word 0... k 1 is checked, M Forbid continues the comprison with 1... k,..., 6 4 n 1 k n 1 1. At most, to check if f ppers in the responsibility zone of level n, M Forbid tkes 6 4 n 1 k t(n) where t(n) is the time tkes by M Serch to nswer request of M Forbid ; the time t(n) is estimted in Section 3.5. Responsibility zone of M Forbid {}}{ N f 0 f 1 f 2... f 0 f 1 f 2... f 0 f 1 f 2... Figure 14. When forbidden pttern f = f 0 f 1... f k is generted by M Forbid, comprisons with the ptterns ppering in the responsibility zone of M Forbid re mde in prllel Scn of the entire responsibility zone by M Serch The Turing mchine M Serch is sent request tht is to sy sequence of symbols which codes the ddress of letter inside responsibility zone of M Forbid mchine by M Forbid ech time n ddress is totlly written on the communiction tpe (the third tpe of M Forbid ). The Turing mchine M Serch must respond the letter corresponding to the ddress inside the responsibility zone, on the first level of the Z construction A 2 Σ. Note tht the responsibility zone of M Forbid mchine of level n does not exctly mtch with the communiction network of M Serch mchines of sme level. Actully M Forbid mchine shres its responsibility zone with three M Serch mchines, nd depending on the ddress of the bit requested, the M Forbid sends its request to the pproprite M Serch mchine (see Figure 15 for n exmple). Tpes of M Serch. The mchine M Serch of level n uses three tpes: the first tpe is the clcultion tpe; the second tpe is the hierrchicl request tpe; this is where the bits of n ddress trnsferred by the M Serch of level n + 1 re written. the three lst tpes re the left request tpe, the center request tpe nd the right request tpe which correspond to the ddresses of the bits sked by the Turing mchine M Forbid of level n loclized respectively to the left, inside nd to the right of the communiction strip of the mchine M Serch considered. Request sent by M Forbid. Ech time tht n ddress is written on the communiction tpe of Turing mchine M Forbid, this mchine sends this request to the corresponding M Serch of the sme level loclized in the sme communiction strip or in communiction strips directly to the left or to the right. M Forbid sends one bit composing the ddress every step of clcultion, so tht level n Turing mchine sends bit every 2 n rows if we implement Turing mchines in the subshift of finite type described in Section 2.6. Adjcent 20

21 strips of sme level cn communicte by communiction chnnels described in Section 2.4 using the fct tht in one row there is only computtion zones of sme level (see Fct 2.4). The bits of the ddress re sent one by one, hence the trnsfer tkes 2 n n rows since the size of the ddress of the request is n. The request is written on the corresponding request tpe. M Forbid wits for the nswer of the corresponding M Serch before to continue the computtion. Request sent by M Serch. A Turing mchine M Serch of level n 2 cn mke request t one of the four Turing mchines M Serch of level n 1 loclized in its dependency. The sking mchine sends one bit composing the ddress every step of clcultion, so tht level n Turing mchine sends bit every 2 n rows nd thus it tkes 2 n n rows to trnsfer the ddress of size n. The mchine M Serch of level n uses communiction chnnels described in Fct 2.8 to communicte: ech border computtion box nd is surrounded by rectngle of the sme level n which communictes with border computtion box of the previous level n 1. Tretment of request. A mchine M Serch of level n successively responds to the different request tpes. The ddress of the request tpe considered is copied on the computtion tpe, nd the mchine keeps in memory to which request tpe it is responding. If the mchine M Serch is of level 1, it directly reds the letter of A Σ. Otherwise the mchine M Serch of level n trnsmits the ddress to the corresponding mchine M Serch of level n 1: the first letter of the ddress indictes which chnnel M Serch must be used to send the continution of the ddress, converted into n 1 bits ddress by ersing the first bit of the ddress. Then the mchine M Serch of level n wits for the nswer, which is obtined when mchine of level 1 is reched (see Figure 15). This letter must be trnsferred bck until it finds the mchine which initilly mde the request. Figure 15. An exmple of request by M Forbid mchine of level 3 the computtion zone on the top of the picture. Depending on the ddress of the letter requested, M Forbid sends its request to either the left, center or right M Serch mchine. On this exmple the M Forbid mchine sends its request to the left M Serch mchine of level 3, which trnsmits it to M Serch mchine of level 2 nd finlly to M Serch mchine of level 1. This lst mchine cn nswer the request. Trnsfer bck of the informtion. When Turing mchine M Serch obtins the bit corresponding to the request, it trnsfers it by the communiction chnnel to the Turing mchine which mde the request vi the request tpes. This opertion is instntneous for two resons. First there is just one box of informtion to trnsmit. Secondly there is just one informtion on the chnnel since the corresponding Turing mchine wits for n nswer. A Turing mchine M Serch eventully nswers the request of the Turing mchine M Forbid of the sme computtion strip, since every M Serch lterntely works for M Forbid of sme level nd higher levels M Serch mchines. Initiliztion of the computtions. When the computtion is initilized, it is importnt not to erse the ddresses on the request tpes, becuse Turing mchines of higher levels my be witing for n nswer. Requests re only mde towrd lower level, so they re nswered even if the ddress does not correspond to rel request. Another problem of initiliztion occurs when Turing mchine mkes request, but is initilized before to obtin its nswer. Actully in this cse we impose tht once the Turing mchine is initilized, it wits for the nswer to its request from the previous computtion before to begin new one. 21

How to simulate Turing machines by invertible one-dimensional cellular automata

How to simulate Turing machines by invertible one-dimensional cellular automata How to simulte Turing mchines by invertible one-dimensionl cellulr utomt Jen-Christophe Dubcq Déprtement de Mthémtiques et d Informtique, École Normle Supérieure de Lyon, 46, llée d Itlie, 69364 Lyon Cedex

More information

This lecture covers Chapter 8 of HMU: Properties of CFLs

This lecture covers Chapter 8 of HMU: Properties of CFLs This lecture covers Chpter 8 of HMU: Properties of CFLs Turing Mchine Extensions of Turing Mchines Restrictions of Turing Mchines Additionl Reding: Chpter 8 of HMU. Turing Mchine: Informl Definition B

More information

CS 275 Automata and Formal Language Theory

CS 275 Automata and Formal Language Theory CS 275 Automt nd Forml Lnguge Theory Course Notes Prt II: The Recognition Problem (II) Chpter II.6.: Push Down Automt Remrk: This mteril is no longer tught nd not directly exm relevnt Anton Setzer (Bsed

More information

Convert the NFA into DFA

Convert the NFA into DFA Convert the NF into F For ech NF we cn find F ccepting the sme lnguge. The numer of sttes of the F could e exponentil in the numer of sttes of the NF, ut in prctice this worst cse occurs rrely. lgorithm:

More information

Finite Automata. Informatics 2A: Lecture 3. John Longley. 22 September School of Informatics University of Edinburgh

Finite Automata. Informatics 2A: Lecture 3. John Longley. 22 September School of Informatics University of Edinburgh Lnguges nd Automt Finite Automt Informtics 2A: Lecture 3 John Longley School of Informtics University of Edinburgh jrl@inf.ed.c.uk 22 September 2017 1 / 30 Lnguges nd Automt 1 Lnguges nd Automt Wht is

More information

Coalgebra, Lecture 15: Equations for Deterministic Automata

Coalgebra, Lecture 15: Equations for Deterministic Automata Colger, Lecture 15: Equtions for Deterministic Automt Julin Slmnc (nd Jurrin Rot) Decemer 19, 2016 In this lecture, we will study the concept of equtions for deterministic utomt. The notes re self contined

More information

AUTOMATA AND LANGUAGES. Definition 1.5: Finite Automaton

AUTOMATA AND LANGUAGES. Definition 1.5: Finite Automaton 25. Finite Automt AUTOMATA AND LANGUAGES A system of computtion tht only hs finite numer of possile sttes cn e modeled using finite utomton A finite utomton is often illustrted s stte digrm d d d. d q

More information

First Midterm Examination

First Midterm Examination Çnky University Deprtment of Computer Engineering 203-204 Fll Semester First Midterm Exmintion ) Design DFA for ll strings over the lphet Σ = {,, c} in which there is no, no nd no cc. 2) Wht lnguge does

More information

Theory of Computation Regular Languages. (NTU EE) Regular Languages Fall / 38

Theory of Computation Regular Languages. (NTU EE) Regular Languages Fall / 38 Theory of Computtion Regulr Lnguges (NTU EE) Regulr Lnguges Fll 2017 1 / 38 Schemtic of Finite Automt control 0 0 1 0 1 1 1 0 Figure: Schemtic of Finite Automt A finite utomton hs finite set of control

More information

For convenience, we rewrite m2 s m2 = m m m ; where m is repeted m times. Since xyz = m m m nd jxyj»m, we hve tht the string y is substring of the fir

For convenience, we rewrite m2 s m2 = m m m ; where m is repeted m times. Since xyz = m m m nd jxyj»m, we hve tht the string y is substring of the fir CSCI 2400 Models of Computtion, Section 3 Solutions to Homework 4 Problem 1. ll the solutions below refer to the Pumping Lemm of Theorem 4.8, pge 119. () L = f n b l k : k n + lg Let's ssume for contrdiction

More information

Non-Deterministic Finite Automata. Fall 2018 Costas Busch - RPI 1

Non-Deterministic Finite Automata. Fall 2018 Costas Busch - RPI 1 Non-Deterministic Finite Automt Fll 2018 Costs Busch - RPI 1 Nondeterministic Finite Automton (NFA) Alphbet ={} q q2 1 q 0 q 3 Fll 2018 Costs Busch - RPI 2 Nondeterministic Finite Automton (NFA) Alphbet

More information

THE EXISTENCE-UNIQUENESS THEOREM FOR FIRST-ORDER DIFFERENTIAL EQUATIONS.

THE EXISTENCE-UNIQUENESS THEOREM FOR FIRST-ORDER DIFFERENTIAL EQUATIONS. THE EXISTENCE-UNIQUENESS THEOREM FOR FIRST-ORDER DIFFERENTIAL EQUATIONS RADON ROSBOROUGH https://intuitiveexplntionscom/picrd-lindelof-theorem/ This document is proof of the existence-uniqueness theorem

More information

Minimal DFA. minimal DFA for L starting from any other

Minimal DFA. minimal DFA for L starting from any other Miniml DFA Among the mny DFAs ccepting the sme regulr lnguge L, there is exctly one (up to renming of sttes) which hs the smllest possile numer of sttes. Moreover, it is possile to otin tht miniml DFA

More information

Theory of Computation Regular Languages

Theory of Computation Regular Languages Theory of Computtion Regulr Lnguges Bow-Yw Wng Acdemi Sinic Spring 2012 Bow-Yw Wng (Acdemi Sinic) Regulr Lnguges Spring 2012 1 / 38 Schemtic of Finite Automt control 0 0 1 0 1 1 1 0 Figure: Schemtic of

More information

Handout: Natural deduction for first order logic

Handout: Natural deduction for first order logic MATH 457 Introduction to Mthemticl Logic Spring 2016 Dr Json Rute Hndout: Nturl deduction for first order logic We will extend our nturl deduction rules for sententil logic to first order logic These notes

More information

Intermediate Math Circles Wednesday, November 14, 2018 Finite Automata II. Nickolas Rollick a b b. a b 4

Intermediate Math Circles Wednesday, November 14, 2018 Finite Automata II. Nickolas Rollick a b b. a b 4 Intermedite Mth Circles Wednesdy, Novemer 14, 2018 Finite Automt II Nickols Rollick nrollick@uwterloo.c Regulr Lnguges Lst time, we were introduced to the ide of DFA (deterministic finite utomton), one

More information

NFAs and Regular Expressions. NFA-ε, continued. Recall. Last class: Today: Fun:

NFAs and Regular Expressions. NFA-ε, continued. Recall. Last class: Today: Fun: CMPU 240 Lnguge Theory nd Computtion Spring 2019 NFAs nd Regulr Expressions Lst clss: Introduced nondeterministic finite utomt with -trnsitions Tody: Prove n NFA- is no more powerful thn n NFA Introduce

More information

Hardness of conjugacy, embedding and factorization of multidimensional subshifts

Hardness of conjugacy, embedding and factorization of multidimensional subshifts Hrdness of conjugcy, embedding nd fctoriztion of multidimensionl subshifts Emmnuel Jendel, Pscl Vnier b LORIA Cmpus Scientifique - BP 239 54506 Vndoeuvre-les-Nncy Frnce b Lbortoire d Algorithmique Complexité

More information

State space systems analysis (continued) Stability. A. Definitions A system is said to be Asymptotically Stable (AS) when it satisfies

State space systems analysis (continued) Stability. A. Definitions A system is said to be Asymptotically Stable (AS) when it satisfies Stte spce systems nlysis (continued) Stbility A. Definitions A system is sid to be Asymptoticlly Stble (AS) when it stisfies ut () = 0, t > 0 lim xt () 0. t A system is AS if nd only if the impulse response

More information

MORE FUNCTION GRAPHING; OPTIMIZATION. (Last edited October 28, 2013 at 11:09pm.)

MORE FUNCTION GRAPHING; OPTIMIZATION. (Last edited October 28, 2013 at 11:09pm.) MORE FUNCTION GRAPHING; OPTIMIZATION FRI, OCT 25, 203 (Lst edited October 28, 203 t :09pm.) Exercise. Let n be n rbitrry positive integer. Give n exmple of function with exctly n verticl symptotes. Give

More information

Riemann Sums and Riemann Integrals

Riemann Sums and Riemann Integrals Riemnn Sums nd Riemnn Integrls Jmes K. Peterson Deprtment of Biologicl Sciences nd Deprtment of Mthemticl Sciences Clemson University August 26, 2013 Outline 1 Riemnn Sums 2 Riemnn Integrls 3 Properties

More information

Non Deterministic Automata. Linz: Nondeterministic Finite Accepters, page 51

Non Deterministic Automata. Linz: Nondeterministic Finite Accepters, page 51 Non Deterministic Automt Linz: Nondeterministic Finite Accepters, pge 51 1 Nondeterministic Finite Accepter (NFA) Alphbet ={} q 1 q2 q 0 q 3 2 Nondeterministic Finite Accepter (NFA) Alphbet ={} Two choices

More information

Riemann Sums and Riemann Integrals

Riemann Sums and Riemann Integrals Riemnn Sums nd Riemnn Integrls Jmes K. Peterson Deprtment of Biologicl Sciences nd Deprtment of Mthemticl Sciences Clemson University August 26, 203 Outline Riemnn Sums Riemnn Integrls Properties Abstrct

More information

Formal languages, automata, and theory of computation

Formal languages, automata, and theory of computation Mälrdlen University TEN1 DVA337 2015 School of Innovtion, Design nd Engineering Forml lnguges, utomt, nd theory of computtion Thursdy, Novemer 5, 14:10-18:30 Techer: Dniel Hedin, phone 021-107052 The exm

More information

Chapter 2 Finite Automata

Chapter 2 Finite Automata Chpter 2 Finite Automt 28 2.1 Introduction Finite utomt: first model of the notion of effective procedure. (They lso hve mny other pplictions). The concept of finite utomton cn e derived y exmining wht

More information

The Regulated and Riemann Integrals

The Regulated and Riemann Integrals Chpter 1 The Regulted nd Riemnn Integrls 1.1 Introduction We will consider severl different pproches to defining the definite integrl f(x) dx of function f(x). These definitions will ll ssign the sme vlue

More information

USA Mathematical Talent Search Round 1 Solutions Year 21 Academic Year

USA Mathematical Talent Search Round 1 Solutions Year 21 Academic Year 1/1/21. Fill in the circles in the picture t right with the digits 1-8, one digit in ech circle with no digit repeted, so tht no two circles tht re connected by line segment contin consecutive digits.

More information

CMSC 330: Organization of Programming Languages. DFAs, and NFAs, and Regexps (Oh my!)

CMSC 330: Organization of Programming Languages. DFAs, and NFAs, and Regexps (Oh my!) CMSC 330: Orgniztion of Progrmming Lnguges DFAs, nd NFAs, nd Regexps (Oh my!) CMSC330 Spring 2018 Types of Finite Automt Deterministic Finite Automt (DFA) Exctly one sequence of steps for ech string All

More information

Finite Automata Theory and Formal Languages TMV027/DIT321 LP4 2018

Finite Automata Theory and Formal Languages TMV027/DIT321 LP4 2018 Finite Automt Theory nd Forml Lnguges TMV027/DIT321 LP4 2018 Lecture 10 An Bove April 23rd 2018 Recp: Regulr Lnguges We cn convert between FA nd RE; Hence both FA nd RE ccept/generte regulr lnguges; More

More information

Assignment 1 Automata, Languages, and Computability. 1 Finite State Automata and Regular Languages

Assignment 1 Automata, Languages, and Computability. 1 Finite State Automata and Regular Languages Deprtment of Computer Science, Austrlin Ntionl University COMP2600 Forml Methods for Softwre Engineering Semester 2, 206 Assignment Automt, Lnguges, nd Computility Smple Solutions Finite Stte Automt nd

More information

Integral points on the rational curve

Integral points on the rational curve Integrl points on the rtionl curve y x bx c x ;, b, c integers. Konstntine Zeltor Mthemtics University of Wisconsin - Mrinette 750 W. Byshore Street Mrinette, WI 5443-453 Also: Konstntine Zeltor P.O. Box

More information

Finite Automata-cont d

Finite Automata-cont d Automt Theory nd Forml Lnguges Professor Leslie Lnder Lecture # 6 Finite Automt-cont d The Pumping Lemm WEB SITE: http://ingwe.inghmton.edu/ ~lnder/cs573.html Septemer 18, 2000 Exmple 1 Consider L = {ww

More information

CMPSCI 250: Introduction to Computation. Lecture #31: What DFA s Can and Can t Do David Mix Barrington 9 April 2014

CMPSCI 250: Introduction to Computation. Lecture #31: What DFA s Can and Can t Do David Mix Barrington 9 April 2014 CMPSCI 250: Introduction to Computtion Lecture #31: Wht DFA s Cn nd Cn t Do Dvid Mix Brrington 9 April 2014 Wht DFA s Cn nd Cn t Do Deterministic Finite Automt Forml Definition of DFA s Exmples of DFA

More information

CSCI FOUNDATIONS OF COMPUTER SCIENCE

CSCI FOUNDATIONS OF COMPUTER SCIENCE 1 CSCI- 2200 FOUNDATIONS OF COMPUTER SCIENCE Spring 2015 My 7, 2015 2 Announcements Homework 9 is due now. Some finl exm review problems will be posted on the web site tody. These re prcqce problems not

More information

Finite Automata. Informatics 2A: Lecture 3. Mary Cryan. 21 September School of Informatics University of Edinburgh

Finite Automata. Informatics 2A: Lecture 3. Mary Cryan. 21 September School of Informatics University of Edinburgh Finite Automt Informtics 2A: Lecture 3 Mry Cryn School of Informtics University of Edinburgh mcryn@inf.ed.c.uk 21 September 2018 1 / 30 Lnguges nd Automt Wht is lnguge? Finite utomt: recp Some forml definitions

More information

Non-deterministic Finite Automata

Non-deterministic Finite Automata Non-deterministic Finite Automt Eliminting non-determinism Rdoud University Nijmegen Non-deterministic Finite Automt H. Geuvers nd T. vn Lrhoven Institute for Computing nd Informtion Sciences Intelligent

More information

Formal Languages and Automata

Formal Languages and Automata Moile Computing nd Softwre Engineering p. 1/5 Forml Lnguges nd Automt Chpter 2 Finite Automt Chun-Ming Liu cmliu@csie.ntut.edu.tw Deprtment of Computer Science nd Informtion Engineering Ntionl Tipei University

More information

Anatomy of a Deterministic Finite Automaton. Deterministic Finite Automata. A machine so simple that you can understand it in less than one minute

Anatomy of a Deterministic Finite Automaton. Deterministic Finite Automata. A machine so simple that you can understand it in less than one minute Victor Admchik Dnny Sletor Gret Theoreticl Ides In Computer Science CS 5-25 Spring 2 Lecture 2 Mr 3, 2 Crnegie Mellon University Deterministic Finite Automt Finite Automt A mchine so simple tht you cn

More information

Designing finite automata II

Designing finite automata II Designing finite utomt II Prolem: Design DFA A such tht L(A) consists of ll strings of nd which re of length 3n, for n = 0, 1, 2, (1) Determine wht to rememer out the input string Assign stte to ech of

More information

SOLUTIONS FOR ADMISSIONS TEST IN MATHEMATICS, COMPUTER SCIENCE AND JOINT SCHOOLS WEDNESDAY 5 NOVEMBER 2014

SOLUTIONS FOR ADMISSIONS TEST IN MATHEMATICS, COMPUTER SCIENCE AND JOINT SCHOOLS WEDNESDAY 5 NOVEMBER 2014 SOLUTIONS FOR ADMISSIONS TEST IN MATHEMATICS, COMPUTER SCIENCE AND JOINT SCHOOLS WEDNESDAY 5 NOVEMBER 014 Mrk Scheme: Ech prt of Question 1 is worth four mrks which re wrded solely for the correct nswer.

More information

440-2 Geometry/Topology: Differentiable Manifolds Northwestern University Solutions of Practice Problems for Final Exam

440-2 Geometry/Topology: Differentiable Manifolds Northwestern University Solutions of Practice Problems for Final Exam 440-2 Geometry/Topology: Differentible Mnifolds Northwestern University Solutions of Prctice Problems for Finl Exm 1) Using the cnonicl covering of RP n by {U α } 0 α n, where U α = {[x 0 : : x n ] RP

More information

Chapter Five: Nondeterministic Finite Automata. Formal Language, chapter 5, slide 1

Chapter Five: Nondeterministic Finite Automata. Formal Language, chapter 5, slide 1 Chpter Five: Nondeterministic Finite Automt Forml Lnguge, chpter 5, slide 1 1 A DFA hs exctly one trnsition from every stte on every symol in the lphet. By relxing this requirement we get relted ut more

More information

1 Nondeterministic Finite Automata

1 Nondeterministic Finite Automata 1 Nondeterministic Finite Automt Suppose in life, whenever you hd choice, you could try oth possiilities nd live your life. At the end, you would go ck nd choose the one tht worked out the est. Then you

More information

Math 1B, lecture 4: Error bounds for numerical methods

Math 1B, lecture 4: Error bounds for numerical methods Mth B, lecture 4: Error bounds for numericl methods Nthn Pflueger 4 September 0 Introduction The five numericl methods descried in the previous lecture ll operte by the sme principle: they pproximte the

More information

Parse trees, ambiguity, and Chomsky normal form

Parse trees, ambiguity, and Chomsky normal form Prse trees, miguity, nd Chomsky norml form In this lecture we will discuss few importnt notions connected with contextfree grmmrs, including prse trees, miguity, nd specil form for context-free grmmrs

More information

DISCRETE MATHEMATICS HOMEWORK 3 SOLUTIONS

DISCRETE MATHEMATICS HOMEWORK 3 SOLUTIONS DISCRETE MATHEMATICS 21228 HOMEWORK 3 SOLUTIONS JC Due in clss Wednesdy September 17. You my collborte but must write up your solutions by yourself. Lte homework will not be ccepted. Homework must either

More information

1.3 Regular Expressions

1.3 Regular Expressions 56 1.3 Regulr xpressions These hve n importnt role in describing ptterns in serching for strings in mny pplictions (e.g. wk, grep, Perl,...) All regulr expressions of lphbet re 1.Ønd re regulr expressions,

More information

13.3 CLASSICAL STRAIGHTEDGE AND COMPASS CONSTRUCTIONS

13.3 CLASSICAL STRAIGHTEDGE AND COMPASS CONSTRUCTIONS 33 CLASSICAL STRAIGHTEDGE AND COMPASS CONSTRUCTIONS As simple ppliction of the results we hve obtined on lgebric extensions, nd in prticulr on the multiplictivity of extension degrees, we cn nswer (in

More information

State Minimization for DFAs

State Minimization for DFAs Stte Minimiztion for DFAs Red K & S 2.7 Do Homework 10. Consider: Stte Minimiztion 4 5 Is this miniml mchine? Step (1): Get rid of unrechle sttes. Stte Minimiztion 6, Stte is unrechle. Step (2): Get rid

More information

N 0 completions on partial matrices

N 0 completions on partial matrices N 0 completions on prtil mtrices C. Jordán C. Mendes Arújo Jun R. Torregros Instituto de Mtemátic Multidisciplinr / Centro de Mtemátic Universidd Politécnic de Vlenci / Universidde do Minho Cmino de Ver

More information

1.4 Nonregular Languages

1.4 Nonregular Languages 74 1.4 Nonregulr Lnguges The number of forml lnguges over ny lphbet (= decision/recognition problems) is uncountble On the other hnd, the number of regulr expressions (= strings) is countble Hence, ll

More information

p-adic Egyptian Fractions

p-adic Egyptian Fractions p-adic Egyptin Frctions Contents 1 Introduction 1 2 Trditionl Egyptin Frctions nd Greedy Algorithm 2 3 Set-up 3 4 p-greedy Algorithm 5 5 p-egyptin Trditionl 10 6 Conclusion 1 Introduction An Egyptin frction

More information

Vyacheslav Telnin. Search for New Numbers.

Vyacheslav Telnin. Search for New Numbers. Vycheslv Telnin Serch for New Numbers. 1 CHAPTER I 2 I.1 Introduction. In 1984, in the first issue for tht yer of the Science nd Life mgzine, I red the rticle "Non-Stndrd Anlysis" by V. Uspensky, in which

More information

Lecture 09: Myhill-Nerode Theorem

Lecture 09: Myhill-Nerode Theorem CS 373: Theory of Computtion Mdhusudn Prthsrthy Lecture 09: Myhill-Nerode Theorem 16 Ferury 2010 In this lecture, we will see tht every lnguge hs unique miniml DFA We will see this fct from two perspectives

More information

Part 5 out of 5. Automata & languages. A primer on the Theory of Computation. Last week was all about. a superset of Regular Languages

Part 5 out of 5. Automata & languages. A primer on the Theory of Computation. Last week was all about. a superset of Regular Languages Automt & lnguges A primer on the Theory of Computtion Lurent Vnbever www.vnbever.eu Prt 5 out of 5 ETH Zürich (D-ITET) October, 19 2017 Lst week ws ll bout Context-Free Lnguges Context-Free Lnguges superset

More information

Recursively Enumerable and Recursive. Languages

Recursively Enumerable and Recursive. Languages Recursively Enumerble nd Recursive nguges 1 Recll Definition (clss 19.pdf) Definition 10.4, inz, 6 th, pge 279 et S be set of strings. An enumertion procedure for Turing Mchine tht genertes ll strings

More information

Convex Sets and Functions

Convex Sets and Functions B Convex Sets nd Functions Definition B1 Let L, +, ) be rel liner spce nd let C be subset of L The set C is convex if, for ll x,y C nd ll [, 1], we hve 1 )x+y C In other words, every point on the line

More information

CMSC 330: Organization of Programming Languages

CMSC 330: Organization of Programming Languages CMSC 330: Orgniztion of Progrmming Lnguges Finite Automt 2 CMSC 330 1 Types of Finite Automt Deterministic Finite Automt (DFA) Exctly one sequence of steps for ech string All exmples so fr Nondeterministic

More information

Talen en Automaten Test 1, Mon 7 th Dec, h45 17h30

Talen en Automaten Test 1, Mon 7 th Dec, h45 17h30 Tlen en Automten Test 1, Mon 7 th Dec, 2015 15h45 17h30 This test consists of four exercises over 5 pges. Explin your pproch, nd write your nswer to ech exercise on seprte pge. You cn score mximum of 100

More information

W. We shall do so one by one, starting with I 1, and we shall do it greedily, trying

W. We shall do so one by one, starting with I 1, and we shall do it greedily, trying Vitli covers 1 Definition. A Vitli cover of set E R is set V of closed intervls with positive length so tht, for every δ > 0 nd every x E, there is some I V with λ(i ) < δ nd x I. 2 Lemm (Vitli covering)

More information

Types of Finite Automata. CMSC 330: Organization of Programming Languages. Comparing DFAs and NFAs. NFA for (a b)*abb.

Types of Finite Automata. CMSC 330: Organization of Programming Languages. Comparing DFAs and NFAs. NFA for (a b)*abb. CMSC 330: Orgniztion of Progrmming Lnguges Finite Automt 2 Types of Finite Automt Deterministic Finite Automt () Exctly one sequence of steps for ech string All exmples so fr Nondeterministic Finite Automt

More information

Chapter 0. What is the Lebesgue integral about?

Chapter 0. What is the Lebesgue integral about? Chpter 0. Wht is the Lebesgue integrl bout? The pln is to hve tutoril sheet ech week, most often on Fridy, (to be done during the clss) where you will try to get used to the ides introduced in the previous

More information

Lecture 3: Equivalence Relations

Lecture 3: Equivalence Relations Mthcmp Crsh Course Instructor: Pdric Brtlett Lecture 3: Equivlence Reltions Week 1 Mthcmp 2014 In our lst three tlks of this clss, we shift the focus of our tlks from proof techniques to proof concepts

More information

CS 275 Automata and Formal Language Theory

CS 275 Automata and Formal Language Theory CS 275 Automt nd Forml Lnguge Theory Course Notes Prt II: The Recognition Problem (II) Chpter II.5.: Properties of Context Free Grmmrs (14) Anton Setzer (Bsed on book drft by J. V. Tucker nd K. Stephenson)

More information

Chapter 14. Matrix Representations of Linear Transformations

Chapter 14. Matrix Representations of Linear Transformations Chpter 4 Mtrix Representtions of Liner Trnsformtions When considering the Het Stte Evolution, we found tht we could describe this process using multipliction by mtrix. This ws nice becuse computers cn

More information

Chapter 4 Contravariance, Covariance, and Spacetime Diagrams

Chapter 4 Contravariance, Covariance, and Spacetime Diagrams Chpter 4 Contrvrince, Covrince, nd Spcetime Digrms 4. The Components of Vector in Skewed Coordintes We hve seen in Chpter 3; figure 3.9, tht in order to show inertil motion tht is consistent with the Lorentz

More information

Let's start with an example:

Let's start with an example: Finite Automt Let's strt with n exmple: Here you see leled circles tht re sttes, nd leled rrows tht re trnsitions. One of the sttes is mrked "strt". One of the sttes hs doule circle; this is terminl stte

More information

Lecture 08: Feb. 08, 2019

Lecture 08: Feb. 08, 2019 4CS4-6:Theory of Computtion(Closure on Reg. Lngs., regex to NDFA, DFA to regex) Prof. K.R. Chowdhry Lecture 08: Fe. 08, 2019 : Professor of CS Disclimer: These notes hve not een sujected to the usul scrutiny

More information

Types of Finite Automata. CMSC 330: Organization of Programming Languages. Comparing DFAs and NFAs. Comparing DFAs and NFAs (cont.) Finite Automata 2

Types of Finite Automata. CMSC 330: Organization of Programming Languages. Comparing DFAs and NFAs. Comparing DFAs and NFAs (cont.) Finite Automata 2 CMSC 330: Orgniztion of Progrmming Lnguges Finite Automt 2 Types of Finite Automt Deterministic Finite Automt () Exctly one sequence of steps for ech string All exmples so fr Nondeterministic Finite Automt

More information

UniversitaireWiskundeCompetitie. Problem 2005/4-A We have k=1. Show that for every q Q satisfying 0 < q < 1, there exists a finite subset K N so that

UniversitaireWiskundeCompetitie. Problem 2005/4-A We have k=1. Show that for every q Q satisfying 0 < q < 1, there exists a finite subset K N so that Problemen/UWC NAW 5/7 nr juni 006 47 Problemen/UWC UniversitireWiskundeCompetitie Edition 005/4 For Session 005/4 we received submissions from Peter Vndendriessche, Vldislv Frnk, Arne Smeets, Jn vn de

More information

7.2 The Definite Integral

7.2 The Definite Integral 7.2 The Definite Integrl the definite integrl In the previous section, it ws found tht if function f is continuous nd nonnegtive, then the re under the grph of f on [, b] is given by F (b) F (), where

More information

Properties of Integrals, Indefinite Integrals. Goals: Definition of the Definite Integral Integral Calculations using Antiderivatives

Properties of Integrals, Indefinite Integrals. Goals: Definition of the Definite Integral Integral Calculations using Antiderivatives Block #6: Properties of Integrls, Indefinite Integrls Gols: Definition of the Definite Integrl Integrl Clcultions using Antiderivtives Properties of Integrls The Indefinite Integrl 1 Riemnn Sums - 1 Riemnn

More information

CS5371 Theory of Computation. Lecture 20: Complexity V (Polynomial-Time Reducibility)

CS5371 Theory of Computation. Lecture 20: Complexity V (Polynomial-Time Reducibility) CS5371 Theory of Computtion Lecture 20: Complexity V (Polynomil-Time Reducibility) Objectives Polynomil Time Reducibility Prove Cook-Levin Theorem Polynomil Time Reducibility Previously, we lernt tht if

More information

The final exam will take place on Friday May 11th from 8am 11am in Evans room 60.

The final exam will take place on Friday May 11th from 8am 11am in Evans room 60. Mth 104: finl informtion The finl exm will tke plce on Fridy My 11th from 8m 11m in Evns room 60. The exm will cover ll prts of the course with equl weighting. It will cover Chpters 1 5, 7 15, 17 21, 23

More information

CS 373, Spring Solutions to Mock midterm 1 (Based on first midterm in CS 273, Fall 2008.)

CS 373, Spring Solutions to Mock midterm 1 (Based on first midterm in CS 273, Fall 2008.) CS 373, Spring 29. Solutions to Mock midterm (sed on first midterm in CS 273, Fll 28.) Prolem : Short nswer (8 points) The nswers to these prolems should e short nd not complicted. () If n NF M ccepts

More information

UNIFORM CONVERGENCE. Contents 1. Uniform Convergence 1 2. Properties of uniform convergence 3

UNIFORM CONVERGENCE. Contents 1. Uniform Convergence 1 2. Properties of uniform convergence 3 UNIFORM CONVERGENCE Contents 1. Uniform Convergence 1 2. Properties of uniform convergence 3 Suppose f n : Ω R or f n : Ω C is sequence of rel or complex functions, nd f n f s n in some sense. Furthermore,

More information

CSC 473 Automata, Grammars & Languages 11/9/10

CSC 473 Automata, Grammars & Languages 11/9/10 CSC 473 utomt, Grmmrs & Lnguges 11/9/10 utomt, Grmmrs nd Lnguges Discourse 06 Decidbility nd Undecidbility Decidble Problems for Regulr Lnguges Theorem 4.1: (embership/cceptnce Prob. for DFs) = {, w is

More information

Math& 152 Section Integration by Parts

Math& 152 Section Integration by Parts Mth& 5 Section 7. - Integrtion by Prts Integrtion by prts is rule tht trnsforms the integrl of the product of two functions into other (idelly simpler) integrls. Recll from Clculus I tht given two differentible

More information

Exam 2, Mathematics 4701, Section ETY6 6:05 pm 7:40 pm, March 31, 2016, IH-1105 Instructor: Attila Máté 1

Exam 2, Mathematics 4701, Section ETY6 6:05 pm 7:40 pm, March 31, 2016, IH-1105 Instructor: Attila Máté 1 Exm, Mthemtics 471, Section ETY6 6:5 pm 7:4 pm, Mrch 1, 16, IH-115 Instructor: Attil Máté 1 17 copies 1. ) Stte the usul sufficient condition for the fixed-point itertion to converge when solving the eqution

More information

HW3, Math 307. CSUF. Spring 2007.

HW3, Math 307. CSUF. Spring 2007. HW, Mth 7. CSUF. Spring 7. Nsser M. Abbsi Spring 7 Compiled on November 5, 8 t 8:8m public Contents Section.6, problem Section.6, problem Section.6, problem 5 Section.6, problem 7 6 5 Section.6, problem

More information

SCHOOL OF ENGINEERING & BUILT ENVIRONMENT. Mathematics

SCHOOL OF ENGINEERING & BUILT ENVIRONMENT. Mathematics SCHOOL OF ENGINEERING & BUIL ENVIRONMEN Mthemtics An Introduction to Mtrices Definition of Mtri Size of Mtri Rows nd Columns of Mtri Mtri Addition Sclr Multipliction of Mtri Mtri Multipliction 7 rnspose

More information

Nondeterminism and Nodeterministic Automata

Nondeterminism and Nodeterministic Automata Nondeterminism nd Nodeterministic Automt 61 Nondeterminism nd Nondeterministic Automt The computtionl mchine models tht we lerned in the clss re deterministic in the sense tht the next move is uniquely

More information

Introduction to Group Theory

Introduction to Group Theory Introduction to Group Theory Let G be n rbitrry set of elements, typiclly denoted s, b, c,, tht is, let G = {, b, c, }. A binry opertion in G is rule tht ssocites with ech ordered pir (,b) of elements

More information

Note 16. Stokes theorem Differential Geometry, 2005

Note 16. Stokes theorem Differential Geometry, 2005 Note 16. Stokes theorem ifferentil Geometry, 2005 Stokes theorem is the centrl result in the theory of integrtion on mnifolds. It gives the reltion between exterior differentition (see Note 14) nd integrtion

More information

Regular expressions, Finite Automata, transition graphs are all the same!!

Regular expressions, Finite Automata, transition graphs are all the same!! CSI 3104 /Winter 2011: Introduction to Forml Lnguges Chpter 7: Kleene s Theorem Chpter 7: Kleene s Theorem Regulr expressions, Finite Automt, trnsition grphs re ll the sme!! Dr. Neji Zgui CSI3104-W11 1

More information

Linear Algebra 1A - solutions of ex.4

Linear Algebra 1A - solutions of ex.4 Liner Algebr A - solutions of ex.4 For ech of the following, nd the inverse mtrix (mtritz hofkhit if it exists - ( 6 6 A, B (, C 3, D, 4 4 ( E i, F (inverse over C for F. i Also, pick n invertible mtrix

More information

Improper Integrals, and Differential Equations

Improper Integrals, and Differential Equations Improper Integrls, nd Differentil Equtions October 22, 204 5.3 Improper Integrls Previously, we discussed how integrls correspond to res. More specificlly, we sid tht for function f(x), the region creted

More information

1 1D heat and wave equations on a finite interval

1 1D heat and wave equations on a finite interval 1 1D het nd wve equtions on finite intervl In this section we consider generl method of seprtion of vribles nd its pplictions to solving het eqution nd wve eqution on finite intervl ( 1, 2. Since by trnsltion

More information

Vectors , (0,0). 5. A vector is commonly denoted by putting an arrow above its symbol, as in the picture above. Here are some 3-dimensional vectors:

Vectors , (0,0). 5. A vector is commonly denoted by putting an arrow above its symbol, as in the picture above. Here are some 3-dimensional vectors: Vectors 1-23-2018 I ll look t vectors from n lgeric point of view nd geometric point of view. Algericlly, vector is n ordered list of (usully) rel numers. Here re some 2-dimensionl vectors: (2, 3), ( )

More information

Non-deterministic Finite Automata

Non-deterministic Finite Automata Non-deterministic Finite Automt From Regulr Expressions to NFA- Eliminting non-determinism Rdoud University Nijmegen Non-deterministic Finite Automt H. Geuvers nd J. Rot Institute for Computing nd Informtion

More information

CS415 Compilers. Lexical Analysis and. These slides are based on slides copyrighted by Keith Cooper, Ken Kennedy & Linda Torczon at Rice University

CS415 Compilers. Lexical Analysis and. These slides are based on slides copyrighted by Keith Cooper, Ken Kennedy & Linda Torczon at Rice University CS415 Compilers Lexicl Anlysis nd These slides re sed on slides copyrighted y Keith Cooper, Ken Kennedy & Lind Torczon t Rice University First Progrmming Project Instruction Scheduling Project hs een posted

More information

5.7 Improper Integrals

5.7 Improper Integrals 458 pplictions of definite integrls 5.7 Improper Integrls In Section 5.4, we computed the work required to lift pylod of mss m from the surfce of moon of mss nd rdius R to height H bove the surfce of the

More information

Math 61CM - Solutions to homework 9

Math 61CM - Solutions to homework 9 Mth 61CM - Solutions to homework 9 Cédric De Groote November 30 th, 2018 Problem 1: Recll tht the left limit of function f t point c is defined s follows: lim f(x) = l x c if for ny > 0 there exists δ

More information

Frobenius numbers of generalized Fibonacci semigroups

Frobenius numbers of generalized Fibonacci semigroups Frobenius numbers of generlized Fiboncci semigroups Gretchen L. Mtthews 1 Deprtment of Mthemticl Sciences, Clemson University, Clemson, SC 29634-0975, USA gmtthe@clemson.edu Received:, Accepted:, Published:

More information

1 From NFA to regular expression

1 From NFA to regular expression Note 1: How to convert DFA/NFA to regulr expression Version: 1.0 S/EE 374, Fll 2017 Septemer 11, 2017 In this note, we show tht ny DFA cn e converted into regulr expression. Our construction would work

More information

DIRECT CURRENT CIRCUITS

DIRECT CURRENT CIRCUITS DRECT CURRENT CUTS ELECTRC POWER Consider the circuit shown in the Figure where bttery is connected to resistor R. A positive chrge dq will gin potentil energy s it moves from point to point b through

More information

12.1 Nondeterminism Nondeterministic Finite Automata. a a b ε. CS125 Lecture 12 Fall 2016

12.1 Nondeterminism Nondeterministic Finite Automata. a a b ε. CS125 Lecture 12 Fall 2016 CS125 Lecture 12 Fll 2016 12.1 Nondeterminism The ide of nondeterministic computtions is to llow our lgorithms to mke guesses, nd only require tht they ccept when the guesses re correct. For exmple, simple

More information

CHAPTER 1 Regular Languages. Contents

CHAPTER 1 Regular Languages. Contents Finite Automt (FA or DFA) CHAPTE 1 egulr Lnguges Contents definitions, exmples, designing, regulr opertions Non-deterministic Finite Automt (NFA) definitions, euivlence of NFAs nd DFAs, closure under regulr

More information

Bernoulli Numbers Jeff Morton

Bernoulli Numbers Jeff Morton Bernoulli Numbers Jeff Morton. We re interested in the opertor e t k d k t k, which is to sy k tk. Applying this to some function f E to get e t f d k k tk d k f f + d k k tk dk f, we note tht since f

More information

5.1 Definitions and Examples 5.2 Deterministic Pushdown Automata

5.1 Definitions and Examples 5.2 Deterministic Pushdown Automata CSC4510 AUTOMATA 5.1 Definitions nd Exmples 5.2 Deterministic Pushdown Automt Definitions nd Exmples A lnguge cn be generted by CFG if nd only if it cn be ccepted by pushdown utomton. A pushdown utomton

More information