A Survey of Methods for Generating a Test Sequence for Conformance Testing of Finite State Machine

Size: px
Start display at page:

Download "A Survey of Methods for Generating a Test Sequence for Conformance Testing of Finite State Machine"

Transcription

1 ISSN: Hnn Ndeem et l, Int.J.Compute Technology & Applictions,Vol 5 (2), A Suvey of Methods fo Geneting Test Sequence fo Confomnce Testing of Finite Stte Mchine Zin Eid King Adul Aziz Univesity Jeddh, Sudi Ai zineid@hotmil.com Hnn Ndeem Reem Al Gmdi King Adul Aziz Univesity King Adul Aziz Univesity Jeddh, Sudi Ai Jeddh, Sudi Ai hnnndeem@hotmil.com Reem382@hotmil.com Astct Finite stte mchines testing polems hs een studied due to its pplictions to confomnce testing of communiction potocol; we will focus on the pimy polems of confomnce testing (o fult detection polem) sed on knowing whee we e duing the epeiment, using sttus messge, eset nd distinguishing. Given specifiction mchine we hve its stte tnsition nd output functions in the fom of tnsition digm o "lck o" which we cn only oseve its input/output ehviou, nd we will design test to detemine whethe implementtion confoms to the specifiction y geneting nd using test clled checking. We discuss thee methods fo geneting checking : Sttus Messge nd Reset, Distinguishing Sequence Method nd Using Septing Sequences Insted of Sttus Mssges. Finlly, we will eview smll compison etween those methods out how we cn choose etween them.. Intoduction An FSM (finite stte mchine) is mchine of finite nume of sttes poduces outputs on stte tnsitions fte eceiving inputs. FSM e widely used to model systems in divese es including sequentil cicuits, pticul types of pogms (epesented y leicl nlysis, ptten mtching etc.), nd moe ecently communiction potocols. An FSM cn e descied y quintuple M = (Q,,, q,f) whee: Q is set of finite intenl sttes. is set of finite input lphet :QS Q is totl functions clled the tnsition function which epesent tht the mchine M is moving fom stte q to the stte (q,) when eceiving n input. q in Q is the stt stte, F Q; elements of F e clled ccept o finl sttes.[] An FSM cn e lso epesented y stte tnsition digm diected gph whose vetices coespond to the sttes of the mchine nd whose edges coespond to the stte tnsitions nd lelled with the input nd output of tht tnsition s shown in Fig.. Testing FSM polem hs een studied in diffeent es nd t vious times nd the e seemed to hve mostly died down until few yes go when the testing polem ws esuected nd is now eing studied new due to its pplictions to confomnce testing of communiction potocol.it is vey wide fields of testing hdwe nd softwe includes with n etensive litetue which we cnnot hope to include hee we will focus on the sic polems of confomnce testing (o fult detection polem). Figue. Tnsition digm of finite stte mchine Thee e two types of FSM (finite stte mchines): Mely nd Mooe mchines. The theoy of oth types is vey simil, we minly conside Mely mchines ecuse its model finite stte systems moe popely. And lso we hve two types of testing polems: IJCTA Mch-Apil 24 Aville online@ 435

2 ISSN: Hnn Ndeem et l, Int.J.Compute Technology & Applictions,Vol 5 (2), in the fist one we hve mchine M with complete desciption nd we hve the tnsition digm of it ut we lck some infomtion out in which stte it is Polem: detemining the finl stte fte the test. Polem2: stte identifiction polem to identify the initil stte nd the test tht solve this polem is clled distinguishing. Polem3: stte veifiction polem which veify tht the mchine in the specified stte nd the test tht solve this polem is clled unique Input/output UIO..2. In the second type of testing the mchine M tht is eing tested is eithe lck o i.e. we don t know its stte digm (the tnsition nd output function) nd only we cn ecognize its I/O ehvio o we hve nd know the mchine tnsition digm, nd we hve to test whethe the implementtion confoms to the specifiction which clled the confomnce testing o fult detection polem nd the test tht solve this polem is clled checking. In ou ppe, we will discuss 3 methods fo constucting checking fo the confomnce testing polem. In section II, we will discuss the concept of confomnce testing polem, in section III we descie the Sttus Messge nd Reset messge, In section IV the Distinguishing Sequence Method is descied, nd in section V Using Septing Sequences Insted of Sttus Mssges including(w method, Wp method, UIO method, Distinguishing Sequence Method), In section VI we will descie the Using Identifying Sequences Insted of Distinguishing Sequences method. 2. Confomnce Testing Given n FSM M S which cts s specifiction nd fo which we know its tnsition digm, nd nothe finite stte mchine M I, which we cn only oseve its ehvio,; we wnt to test whethe M I coectly implements o confoms to M S. Confomnce is fomlly defined s equivlence o isomophism whee M I confoms to its specifiction M S if nd only if thei initil sttes e equivlent, i.e. they will poduce the sme output fo evey input, nd in genel two sttes s i nd s j e equivlent (iff) if nd only if fo evey input the mchine genete the sme output[2]. To pove this equivlence of M I nd M S we hve to look fo set of input s to pply it to the mchine M I to pove tht it is equl to its specifiction nd tht input is clled checking. We e inteested to find if M I fils to implement M S o not so the polem of confomnce testing is clled fult detection, The method of testing nd detection the fult in the M I is s follows:. Genete fom the mchine M S set of input s. 2. Applying ech input to M S, poduce the equied output s. 3. Ech pi of the input nd pospective output is test nd the set of ll tests is test suite. 4. Apply ech of the input to the mchine M I nd oseve the output. 5. Compe ctul output with the epected one, nd if they diffe, then the fult is detected [3]. This pocedue of testing s it pesented so f, cn only e used to show the pesence of ugs, ut neve to show thei sence[3]. Geneting checking (set of s tht conctented ct s unique checking ), is diffe fo thei cost to poduce test s, fo the totl size of the test suite (i.e. the totl length of the checking ), nd fo thei fult detection cpility. In fct, test suites should e the shot to e pplicle in pctice, nd it should cove the implementtion s much s possile nd detect s mny fults s possile, we will use diffeent methods to chieve these two opposite gols in which the min diffeence mong those methods e in the ssumptions they mke out the mchines M S nd M I. Some methods e vey efficient in poducing checking ut cn e esticted unde stong ssumptions while Othe methods poduce eponentilly long s, ut pefom the test unde moe genel ssumptions, we cn mke decision of choosing etween methods depending on the fcts we hve o ssumed out the two mchines M S nd M I, nd these ssumptions e of high impotnce ecuse testing mchine without ny ssumption is impossile nd we hve to intoduce some ssumptions out the mchines we wnt to veify nd these ssumptions is s follows:. M S is educed o miniml: ecuse equivlent mchines hve the sme I/O pefomnce, nd it is impossile to distinguish them y oseving the outputs; we cn minimize the mchine M S nd otin n equivlent educed mchine nd In tht miniml mchine thee e no equivlent sttes. Fo evey sttes s nd t, it should eist, clled septing which distinguish s fom t ecuse the set of outputs geneted fom pplying to s e diffeing. 2. M S is completely specified: oth of stte tnsition function δ nd output function λ e defined fo evey stte in Q nd evey input in. IJCTA Mch-Apil 24 Aville online@ 436

3 ISSN: Hnn Ndeem et l, Int.J.Compute Technology & Applictions,Vol 5 (2), M S is stongly connected: which men evey stte is echle fom evey othe vi one o moe stte tnsitions. 4. M I does not chnge duing testing, in cse it hs sme inputs nd outputs s M S. which men M I cn ccept nd espond to ll input symols in. 5. Initil stte: the mchines M I is in its initil stte efoe we conduct confomnce test epeiment. If M I is not in its initil stte, we cn pply homing. 6. Sme nume of sttes: M I nd M S hs the sme nume of sttes. Depending on this ssumption the possile fults in M I could e one of two kinds: output fults, occus ecuse tnsition in the implementtion poduces wong output, nd tnsfe fults, in cse of implementtion goes to the wong stte. Fig. 2 shows two fulty implementtions of the specifiction mchine M S given in Fig.. 7. eset messge: fo ll s, δ(s,eset)=s nd the output function λ(s,eset)= which men tht the mchine hve pticul input eset tht fom ny stte s cuses tnsitions ends in the initil stte s with no output poduced. 8. sttus messge: if we lel the sttes s,s 2,...,s n, we ssume tht the sttus outputs the inde i when pplied to stte si, nd the mchines do not chnge stte. Fomlly si S, λ(s i,sttus)=i δ(s i,sttus)=s i so the sttus messge genetes n output tht uniquely identifies thei cuent stte. 9. set messge: when pticul set of inputs set(s j ) messge is eceived in the initil system stte, the mchines move to stte s j without poducing ny output. Fomlly fo ll t, δ(eset,set(t)) = t nd λ(s,set(t)) = [3][4]. The fist fou popeties listed ove e equiements nd without them confomnce test of the type to e discussed is not possile, the est of the ssumptions e convenient ut not essentil. Confomnce test hs mny methods tht genete the checking using those ssumptions nd some of these methods sed on knowing whee we e duing the epeiment using the pesent o sent of set, eset, nd sttus messges which we will discuss in ou ppe in net sections. Figue.2 two fulty implementtion of Ms 3. STATUSE MESSAGE AND RESET A sttus messge tells us the cuent stte of the mchine. Conceptully, we cn imgine tht thee is specil input sttus, nd upon eceiving this input, the mchine outputs its cuent stte nd stys thee. With sttus messge, the mchine is highly osevle t ny moment. We sy tht the sttus messge is elile if it is gunteed to wok elily in the implementtion mchine M i ; i.e., it outputs the cuent stte without chnging it. Suppose the sttus messge is elile. Then checking cn e esily otined y simply constucting coveing pth of the tnsition digm of the specifiction mchine M s nd pplying the sttus messge t ech stte visited. Becuse sttus messge checked ech stte, we veify whethe M i is simil to M s o not. Futhemoe; evey tnsition is tested ecuse its output is oseved eplicitly, nd its stt nd end stte e veified y thei sttus messges, nd If tht messge is not elile, then we still cn get checking y pplying the sttus messge twice in ow fo ech stte s i t some point duing the epeiment when the coveing pth visits s i ; we just need this doule ppliction of the sttus messge once fo ech stte. The doule ppliction of the sttus messge ensues tht it, woks popely fo evey stte. Fo emple, conside the specifiction mchine M s in Fig., stting t stte S. We hve coveing pth fom input =. Let s denote the sttus messge. If it is effective, then we chieve the checking "sssssss". If it is unelile, then we hve the "ssssssssss". We sy tht the mchine M s hve eset cpility if thee is n initil stte S nd n input symol tht tkes the mchine fom ny stte ck to S, i.e., M s (s i,) = S fo ll sttes s i ; We sy tht the eset is elile if it is gunteed to wok popely in the implementtion mchine M i, i.e. M i (s i, ) = S fo ll s i ; else it is unelile. We hve to know tht fo mchines with elile eset, thee is IJCTA Mch-Apil 24 Aville online@ 437

4 ISSN: polynomil time lgoithm fo constucting checking []. 4. distinguishing methods Distinguishing cn e used s unelile sttus messge ecuse it gives diffeent output fo ech stte; it is like sttus messge, ecept tht it moves the mchine to nothe stte when pplied. This method hs two phses to check whethe the implementtion mchine M I is equivlent to the specifiction Checking Hnn Ndeem et l, Int.J.Compute Technology & Applictions,Vol 5 (2), τ(t,s2) τ(t2,s3) τ(t3,s) output implementtion mchine M I is simil to the specifiction mchine M S. Now it s the time fo estlishing evey stte tnsition in phse2: we wnt to check the tnsition fom stte s i to s j with input/output /o when the mchine is cuently in stte t k. We would fist tke the mchine fom t k to s i, pply input, oseve the output o, nd veify the ending stte s j. We cnnot simply use τ(t k, s i ) to tke the mchine to stte s i, since fults my lte the ending stte. Insted, we pply the following input : τ(t k, s i )τ(t i, s i )[]. Fist tnsfe is ssumed to tke the mchine to stte s i, which is veified y its esponse to, nd s hs een veified y (), τ(t i, s i ) definitely tkes the mchine to stte s i. We then stt testing the tnsition using input nd veify the ending stte y. Theefoe, the following tests fo tnsition fom s i to s j :τ(t k,s i )τ(t i,s i ).(2) mchine M S ; It fist uilds n input tht visits ech stte using tnsfe s insted of eset nd then pplies its distinguishing to test whethe M I is simil to M S. It then uilds n input to test ech tnsition to guntee tht M I confoms to M S. Definition(Tnsfe Sequence): A tnsfe τ(s i,s j ) is tht tkes the mchine fom stte s i to s j ; And since the mchine is stongly connected, so tht is lwys eists fo ny two sttes y the ssumption, Phse : y pplying the distinguishing stting fom stte s i nd let t i e the finl stte which denoted y t i = δ(s i,) nd τ(t i,s i +) is the tnsfe fom t i to s i +. The input tht checks the esponse Afte pefoming this, the mchine will e in stte t j. We epet the sme pocess fo ech stte tnsition nd otin checking. Note tht the checking length is polynomil in the size of the mchine M S nd the length of the distinguishing []. Emple: Fo mchine in Fig., the distinguishing is = nd the esponses fom stte s, s 2, nd s 3 e,, nd espectively. When we pply the distinguishing in sttes s, s 2, nd s 3 it will tke the mchine to t = s 2, t 2 = s 3 nd t 3 = s. And the tnsfe s cn epesented y τ(t,s 2 )=τ(t 2,s 3 )=τ(t 3,s )=. The () ecomes: of the mchine to the distinguishing in ech stte stting fom the initil stte s is: τ(t,s 2 ) τ(t 2,s 3 )...τ(t n,s ) () nd we cn epesent it s follows: Checking τ(t,s2) τ(t2,s3) τ(t3,s) output Stting in stte s, tkes the mchine to stte t nd then τ(t, s 2 ) tnsfes it to stte s 2 fo its esponse to. In the end the mchine esponds to τ(t n, s ). If it opetes coectly, it will e in stte s, nd this is veified y its esponse to the finl. Duing the test, we should ecognize n diffeent esponses to the distinguishing fom n diffeent sttes, nd this veifies tht the We cn see tht this input ends in stte t = s 2, The input s (2) cn e conctented to otin: tns. to test / S- S3 / S2- S2 / S3- S3 / S- S / S2- S3 / S- S2 IJCTA Mch-Apil 24 Aville online@ 438

5 ISSN: input τ(t,s 3) τ(t,s 2) τ(t2,s 3) τ(t3,s 2) τ(t,s 2) τ(t3,s ) end stte output The checking length is 27. Insted of using unique pesent distinguishing fo ll the sttes, we cn use n dptive distinguishing ; (ADS) which is decision tee specifies how to choose the net input dptively depending on the spotted output to identify the initil stte[4]. Figue.3 Adptive Distinguishing Sequence of mchine in figue. Fo ech stte s i, we emine the decision tee nd tke the input i fom the oot to the lef node s i []. Emple: An dptive distinguishing fo the mchine in Figue. is depicted in Figue.3, We pply the input nd if we get the output we know tht the mchine ws in the stte s 2. If we get the output, we should pply, nd if we get the output then we know tht the mchine ws in s othewise we get nd the mchine wee in s 3. We hve =, 2 =, 3 =, nd τ = y using dptive distinguishing (ADS) in ou emple, nd the () ecomes input sequenc e Hnn Ndeem et l, Int.J.Compute Technology & Applictions,Vol 5 (2), τ(t,s3 ) 2 τ(t,s3 ) 3 τ(t,s3 ) Length nd Cost of ADV: it hs O(n 2 ) length with tnsfe cnnot e longe thn n. The () is long O(n 3 ). Becuse thee e pn tnsitions, nd evey (2) hs the length O(n 2 ), nd the cost is gin O(pn 3 ) to find the complete checking. The dvnce of this method is tht it does not need eset messge. 5. Using Septing Sequences Insted of Sttus Mssges Unfotuntely, sttus messge is seldom ville. In the net section, we pesent how not to ely on sttus messge to detemine the cuent stte duing the test. We ssume now tht the mchines hve no sttus messge (ut they still hve eset messge), nd we wish to test whethe M S is equivlent to M I only oseving the etenl ehviou. In the following, we pesent some methods tht cn e unified s poposed y Lee nd Ynnkkis [2]. All these methods she the sme technique nd used to identify the stte y eplcing the use of the sttus messge with mny kinds of s clled in genelly the septing s [2] used to identify the stte which they pplied to. Rememe tht y ssuming M S is miniml, it fo sue does not contin two equivlent sttes,in nothe wod, fo evey pi s i, s j thee must eist n input tht we cll septing, nd tht input will distinguish them ecuse it will poduce diffeent outputs, i.e. λ(s i, ) λ(s j, ). 5.. W Method: This method use specific septing s tht is clled chcteizing set nd nothe set clled tnsition cove set which visit ech tnsition in the mchine. Definition 2. tnsition cove set of M S (o P set fo shot) is set P of input s such tht fo ech stte s S nd ech input I thee eist n input P stting fom s the initil stte nd ending y pplying to stte s. Fomlly s S nd I y P : = y. nd δ(s, y) = s. [3][4]. A P set foces the mchine to pefom evey tnsition nd then stop. A P set cn e uilt y using stndd edth-fist visit of the tnsition digm of the mchine M S. Note tht P set is closed unde the opetion of selecting pefi: if elongs to P, then ny pefi of is in P too. One wy of constucting P[3] is to uild fist testing tee T of M S s eplined in Algoithm nd then get the input geneted fom the ptil pths of T. Whee ptil pth is of consecutive nches, stting fom the oot nd ending in teminl o non-teminl node. Becuse the nches in T e leled y n input symol, so the geneted fom ptil pth q is the input symols on q. In ddition to tht, the empty input is pt of ny P set. Note tht IJCTA Mch-Apil 24 Aville online@ 439

6 ISSN: Hnn Ndeem et l, Int.J.Compute Technology & Applictions,Vol 5 (2), Algoithm temintes ecuse the nume of sttes is finite. Algoithm ( Building test tee). Denote the oot of the tee with the initil stte s,and this is the level 2. Becuse we ledy uilt the tee up to level k, so we hve to continue with the k + st level. ) With ech node t t level k fom left to ight ) if the node t is equl to nothe one t level j, with j k, then t is teminted nd consideed lef of T c) othewise, fo evey input, if the mchine moves fom stte s i to s j, we ttch nch with lel nd node with lel s j Emple: A test tee fo M S of Fig. is shown in Fig. 4. Fom this test tee we otin P = {,,,,,, }. Figue 4. A test tee fo MS of Figue To test evey tnsition of M I the W method uses P set nd uses nothe set insted of the sttus messge, clled chcteizing set o W set, which veify tht we hve the one epected end stte of ech tnsition. Definition 3. chcteizing set is set W of input s such tht fo evey pi of distinct sttes s nd t in S, thee eists n input in W such tht λ(s, ) λ(t, ) [4]. The chcteizing set is iefly clled W set o sometimes septing set. The input s in the W set e lso clled septing s. A W set eists fo evey mchine tht is miniml (Assumption ). The choice of W set is not unique, nd the fewe e the elements in the W set, the longe e the septing s in the W set. An lgoithm fo uilding W set s follows: Ptition the set of sttes S into locks B i with i =,...,. Initilly W is, B = S nd =. Until evey B i is singleton, tke two distinct sttes s nd t in B i (tht includes t lest two sttes) nd uild thei septing. Add to W nd ptition the sttes s ik in evey B j into smlle locks B j,..., B jh sed on thei diffeent output λ(s ik, ). Repet the pocess until ech B i ecomes singleton nd ecomes n. Fo evey pi of sttes s i nd s j, the esulting W set includes n input tht septes s i fom s j. Note tht thee e no moe thn n ptition, nd theefoe W set hs no moe thn n septing s. The W method consists in using the entie W set insted of the sttus messge to test tht the end stte of ech tnsition is the epected one.we hve to ce out W set, ecuse it my contin mny s, we hve to visit fo sevel times the sme end stte of evey tnsition to pply ll the septing s in W nd fo this gol we cn use eset messge nd the s in P set. The set of input is simply otined conctenting evey input in the P set with evey input of W then pply them in ode fte eset messge to tke the mchine ck to the initil stte. In this wy, ech input p ij is the conctention of the i th of P set(to test the i th tnsition) with the j th of W set, with n initil eset input. Fo emple nd fomlly if we hve two sets of input X nd Y, so we cn denote with X.Y the set of input s tht geneted y conctenting ll the input of X with ll the input of Y. The input s poduced y the W method is equl to {eset}.p.w. If we do not oseve ny fult, the implementtion is poved to e coect [3][4]. By pplying the of P we cn simply detecte fulty-output, while ny tnsfe fult is detected y the ppliction of W. Emple[4]: the chcteizing set W of the mchine in Fig. is {,}: Fo stte s, tnsitions / /, Fo stte s 2, tnsitions / /, Fo stte s 3, tnsitions / /. A distinguishes s fom s 2 nd s 3 fom s 2. distinguishes s fom s 3. P = {,,,,,, } the set of test s P.W is epoted in the following tle, whee we indicte with the eset messge.[4] P Tle. test P.W indicte with the eset messge IJCTA Mch-Apil 24 Aville online@ 44

7 ISSN: Hnn Ndeem et l, Int.J.Compute Technology & Applictions,Vol 5 (2), PW Tn-to-test output s / S-S / S- S2 / S2-S2 / S2-S3 / S3-S3 / S3-S nd s j gve the sme output fo ech in W. Mchine M I is simil to M S if fo evey stte s i of M S, the mchine M I hs simil stte s s i, hee we hve n sttes (Assumption 6) then thee eists one-to-one coespondence etween simil sttes of the two mchines M S nd M I. If the fult is uncove y using the input withen the fist phse, we cn pct tht evey stte in M S hs simil stte in the implementtion, nd fo sue M I nd M S e simil. But this is not enough to confim tht thy e equivlent. The poof of the equivlence will e withen phse2. The totl length of the checking is 52. The fult in mchine M s of Fig. 2 is detected y the input, while the tnsfe fults in mchine M s2 e detected y the input tht tests the end stte of the tnsition, fo emple tnsition fom s with input eoneously moves the mchine to s 2 is detected y the input nd Wp Method W o Wp method [4] hs the min dvntge of educing the length of the test suite with espect to the W method. This is the fist method we pesent tht splits the confomnce test in two phses. Duing the fist phse we test tht evey stte defined in M S lso eists in M I, while duing the second phse we hve to check ll tnsitions (not ledy checked duing the fist phse) e coectly implemented. Fo the fist phse, the Wp dosen't use tnsition cove set insted of tht it use stte cove set. Definition 4.[5] stte cove set is set Q of input s such tht fo ech s S, thee eists n input Q tht tkes the mchine to s, i.e. δ(s, ) = s. Using Q set, we cn tke the mchine to evey stte. A Q set cn e geneted y edth-fist of the tnsition gph of M S. On the second phse, the Wp use n identifiction set W i fo stte s i insted of W set (the unique chcteizing set) fo ll sttes whee W i is suset of W. Definition 5.[5] n identifiction set of stte s i is set W i of input s such tht fo ech stte sj in S (with i j) thee eists n input of W i such tht λ(s i, ) λ(s j,) nd n suset of W i hs this popety. Note tht the union of ll the identifiction sets W i is chcteizing set W. Wp Method Phse The input s fo phse one consist in the conctention of Q set with chcteizing set (W set) fte eset. Fomlly, the set of input s is {eset}.q.w. In this wy, evey stte is checked in the implementtion with W set. We sy tht stte q i in M I is simil to stte s i if it poduces the sme outputs on ll the s in W set. A stte q i in M I cn e simil to t most one stte of M S, ecuse if we suppose tht q i is simil to sttes s i nd s j then s i Phse 2: The second phse tests ll the tnsitions. To this im, Wp method uses the identifiction sets. Fo evey tnsition fom stte s j to stte s i on input, we pply (fte eset) which let the mchine go to the stte s j long tnsitions ledy veified, then we pply the input, which let the mchine go to s i, nd then pply one identifiction of W i. finly, epet this test fo evey identifiction in W i, nd if these tests do not uncove ny fult, we hve veified tht the tnsition in the mchine M I fom stte tht is simil to s j on input poduces the ight output (thee is no fulty-output) nd moves to simil stte to s i (unde no tnsfe fult). By pplying these tests to evey tnsition, we cn pove tht M I confoms to its specifiction. The set of input tht coves evey tnsition (nd tht is closed unde the opetion of selecting pefi) is P set. Theefoe, the input of phse2 contin the s of P ending in stte s i tht e not contined in the Q set used y phse, conctented with ll s contined in the identifiction set W i. Fomlly if R = P Q nd i in R ends in s i, the pplied s duing the second phse is {eset}.r. W i. A complete foml poof of coectness fo the Wp method is given in the ppe[4]. Emple.[5] Fig. mchine hs stte cove set Q={,, }. Duing the fist phse we genete the following test s: stte to test Q.Q.W output 2 3 Duing the second phse, we fist compute the identifiction sets. W = {,} ll the s in W e needed to identify s, W 2 = {} distinguishes the stte s 2 fom ll othe sttes, W 3 = {} distinguishes the stte s 3 fom ll othe sttes, R = P Q ={,,, } IJCTA Mch-Apil 24 Aville online@ 44

8 ISSN: R stt stte.r.wi output end stte Hnn Ndeem et l, Int.J.Compute Technology & Applictions,Vol 5 (2), Hee we hve totl length of the checking is 44 (note tht Wp method yields smlle test suite thn the W method). The output fult in mchine M I of Fig. 2 is detected duing the fist phse gin y the input. Some tnsfe fults in M I2 cn e detected on the fist phse, while othes, like the tnsfe fult fom stte s 3 with input is detected only y the input s duing phse UIO Methods If W i set contins only one, this is clled stte signtue [2] o unique input/output (UIO) [5], tht is unique fo the stte s i. By pplying UIO, we cn distinguish stte s i fom ny othe stte, ecuse the output poduced pplying UIO is specific to s i. In this wy, UIO cn detemine the stte of the mchine efoe its ppliction. A UIO hs the opposite ole of homing o synchonizing ; it identifies the fist stte in the insted of the lst one. Note tht not evey stte of the FSM hs UIOs. If UIO eists fo evey stte s i, then UIOs cn e used to identify ech stte in the mchine; in this cse the UIO cts s sttus messge, ecept it moves the mchine to nothe stte. The oiginl UIO method [5] uilds set of input s tht visit evey tnsition fom s i to s j y pplying tnsition cove set P nd then check the end stte s j y pplying its UIO. In this cse, UIO is used insted of sttus messge. Although used in pctice, the UIO method does not guntee to detect evey fult in the implementtion [6] ecuse the uniqueness of the UIO s my not hold in fulty implementtion which my contin stte s' with sme UIO s nothe stte s, nd fulty tnsition ending in s' insted of s my e tested s coect. Note tht, fo this eson, the Wp method uses the W i sets only in the second phse, while, in phse it pplies the complete W insted. A modified vesion of the UIO method, clled UIOv, genetes coect checking s [6]. The UIOv method uilds the test suite in thee phses: () Uv pocess: fo evey stte s in M S pply n input tht egins with eset nd eches s nd then pply the UIO of s. To ech ech stte 2 use Q set. The set of input s consist of (2) Uv pocess: visit evey stte s nd pplies the input pt of the UIO s of ll othe sttes nd check tht the otined output diffes fom the output pt of the UIO pplied. Skip UIO s tht hve the input pt equl to pefi α of the input pt of the UIO of s. Indeed, in this cse, we hve ledy pplied α duing the Uv pocess, nd we know tht the output diffes ecuse two sttes cnnot hve the sme input nd output pt of thei UIO s. At the end of Uv nd Uv pocess we hve veified tht M I is simil to M S. (3) Tnsition test phse: check tht evey tnsition not ledy veified in nd 2 poduces the ight output nd ends in the ight stte y pplying its UIO.[5] Note tht the UIOv method cn e consideed s specil cse of Wp method, whee the W set is the union of ll the UIO s nd phse of the Wp method includes oth Uv pocess nd Uv pocess nd phse 2 is the tnsition test phse. Emple. Fo the mchine in Fig. the UIO s e: UIO = / distinguishes the stte s fom ll othe sttes, UIO2 = / distinguishes the stte s 2 fom ll othe sttes, UIO3 = / distinguishes the stte s 3 fom ll othe sttes. Uv pocess Q stte to test 2 3.Q.UIO output 2. Uv pocess stte to 2 3 test.q. UIO output 3. Tnsition test phse: tnsition to test input / S- S / S2- S2 / S3-S / S3- S3 output The output fult of mchine M I of Fig, 2 is detected duing the Uv pocess gin y the input. Some tnsfe fults in mchine M I2 e detected duing the fist phses, while othes, like the tnsfe fult fom stte s 3 with input is detected only y the input s duing the tnsition test phse. IJCTA Mch-Apil 24 Aville online@ 442

9 ISSN: Hnn Ndeem et l, Int.J.Compute Technology & Applictions,Vol 5 (2), Distinguishing Sequence Method In cse we cn find one tht cn e used s UIO fo evey stte, we cll such distinguishing (DS). In this sitution, we cn pply the DS method using the eset messge [7]. Note tht this DS method cn e viewed s pticul cse of the W method when the chcteizing set W contins only peset distinguishing. The test s e simply otined comining P set with. Emple:Fo the mchine in Fig. we cn tke the = s peset distinguishing. In fct λ M S (s, ) =, λ M S (s 2, ) =, nd λ M S (s 3, ) = P.P. Figue. 5. Using two septing s to identify the stte As usul, we fist check tht M I is simil to M S. We disply fo ech stte s i the esponses to ll the septing s in chcteizing set W (Definition 2). Suppose tht W hs two septing s w nd w 2. We wnt to pply the steps shown (in sque oes) in Fig. 5 () : tke M I to s i, pply w (step ), tke the mchine ck gin to s i (step 2) nd then pply w 2 (step 3). If we oseve the ight output, we cn sy tht the mchine M I hs stte q i simil to s i. We cn stt fom i = nd poceed to veify ll the sttes without using neithe eset no distinguishing. Ou polem Cost nd Length: All the methods pesented in Section 3 she the sme considetions out the length of the checking nd the cost of poducing it. Fo the W method, the cost to compute W set is O(pn2) nd W set contins no moe thn n s of length no moe thn n. The cost to uild tee T set using the Algoithm is O(pn), nd its mimum level is n. The genetion of P set, y visiting T, tkes time O(pn2) nd poduces up to pn s with mimum length n. Since we hve to conctente ech tnsition fom in P set with ech tnsition in W set, we otin up to pn2 s of length n + n, fo totl length of O(pn3) nd totl cost of O(pn3). The Wp method hs the sme totl cost O(pn3) nd sme length O(pn3). Epeimentl esults [4] show tht checking s poduced y the Wp method e genelly shote thn the checking s poduced y the W method. The UIO method nd the method using peset distinguishing e moe epensive, ecuse detemining if stte hs UIO s o peset distinguishing ws poved to e PSPACE hd[8]. Thee e specifiction mchines with eset messge tht equie checking s of length Ω(pn3) [9]. 6. Using Identifying Sequences Insted of Distinguishing Sequences Not evey finite stte mchine hs distinguishing s. In cse the mchine hs no eset messge, no sttus messge, no UIO s, nd no distinguishing s, we cnnot pply the methods poposed so f. We still cn use Assumption nd utilize the eistence of septing s which cn distinguishing the sttes. So confomnce testing is still possile [], nd the esulting checking s could e eponentilly long. tns. to test output s / S- S / S- S2 / S2- S2 / S2- S3 hee pesented ecuse we do not know how to ing M I ck to s i in veifile wy, ecuse in fulty mchine, s shown in Fig. 5 (), tnsfe τ(t i, s i ) (step 2) cn mke the mchine moves to nothe stte s' i whee we cn look fo the epected output pplying the w 2, without needing fo veifying tht s' i is s i nd without le to pply gin w. We use now the Assumption 6, nmely tht M I with only n sttes. Let to e the input nd n is n intege, is the conctention n times of. Theoem. Let s e stte of M I, is n input, o the epected output poduced pplying to s, i.e. o = λ(s, ), τ tnsfe fom t = δ(s, ) ck to s, nd o' the epected output poduced pplying τ to t. By pplying the input ( τ to stte s in M I, if we oseve the output (o o', then the mchine ends in stte whee pplying gin we oseve the sme output o. Figue 6. Applying n times nd τ / S3-S3 / S3-S Poof. The scenio of the theoem is shown in Fig. 6. Suppose tht M I is initilly in stte s. Applying τ the mchine should come ck to s. Howeve, due to some fults, the mchine M I my go to nothe stte q even if the output we oseve is the one epected, i.e. o o'. Assume tht pplying n times τ, we oseve evey time the sme output o o'. Let q e the stte of M I fte the ppliction of ( τ). IJCTA Mch-Apil 24 Aville online@ 443

10 ISSN: Hnn Ndeem et l, Int.J.Compute Technology & Applictions,Vol 5 (2), Note tht even if the n pplictions of τ poduce n times the sme coect output o o', we e not sue tht s, q,..., q n e the sme stte yet. Howeve the n+ sttes s, q,..., q n cnnot e ll distinct, ecuse M I hs n sttes. Hence q n is equl to some q with < n nd, theefoe, it would poduce the sme output o if we pply [8]. Emple: Conside the mchine in Fig. nd tke ny lleged implementtion M I. Apply the input (in this cse τ = ) to the initil stte s of M I nd check tht the output is. We e not sue tht M I is now in stte s, s well. We cn pply gin nd oseve the output nd so on. When we hve pplied nd oseved the output, M I my hve tvesed sttes s, q, q 2, nd the finl stte q3. Ou mchine M I hs only thee sttes, so fo sue q3 is equl to one of s, q, o q 2 nd cetinly if we pply we should oseve. We use Theoem s follows. Assume tht M S hs the chcteizing set W = { w, w 2 } nd let s i e the stte we e going to veify. Let τ e the tnsfe tht tkes M S ck to s i fom t i = δ(w, s i ). We fist pply (wτ) n to s i. If we oseve wong output we hve poved tht M I does not confom to M S. Othewise we cn pply theoem with = w nd we e sue tht M I ends in stte tht would poduce the sme output s if we pplied w. We pply w 2 insted. If we oseve the specified output we cn conclude tht s i hs simil stte in M I. We cn genelize this method when the chcteizing set W contins m septing s. Suppose tht the chcteizing set is W = { w,..., w m }. Let τj e the tnsfe tht tkes the mchine ck to s fte the ppliction of wj, i.e. τj = τ(δ(s, wj ), s). We cn define inductively the s β s follows: identifying then moving to the net stte. Let Ii denote the identifying of stte s i nd τ(t i, s i+ ) to e the tnsfe fom ti = δ(s i, Ii) to s i+, y pplying the following we cn emphsize the simility etween M I nd M S. I τ(t, s 2 ) I2τ(t2, s 3 )... I (2) Once we hve poved tht M I is simil to M S we hve to veify the tnsitions. To do this, we cn use ny Ii s elile eset. Fo emple, we cn tke I s eset to the stte t = δi (s, w m ) nd use t s the initil stte to test evey tnsition. Indeed, we e sue tht if we do not oseve ny fult, I tkes the mchine to t. If we wnt to eset the mchine fom the stte s k to t we pply τ(s k, s )I nd even if τ(s k, s ) fils to tke the mchine to s, we e sue tht I will tke it to t. Now we poceed s eplined in Section VI. To test tnsition etween s i nd s j we cn pply eset I to t, then tnsfe to s i, then we pply the input, nd get the output, finlly pply the identifying Ij to mke sue of the end stte is s j. Emple. Conside the mchine M S in Fig.. W = {, }. Fo s, τ =, I = (w τ) 3 w 2 =, Fo s, τ =, I2 = (w τ) 3 w 2 = nd Fo s, τ =, I3 = (w τ) 3 w 2 =. The (2) ecomes: input sequen ce I τ(t,s 2) I2 τ(t2,s 3) I3 τ(t3, s) I β = w β = (β τ ) n w () By induction, one cn pove tht pplying β fte pplying (β τ ) n would poduce the sme output. Consideing how βi e defined, this mens tht pplying w,..., w - would poduce the sme output. Fo this eson we pply w fte (β τ ) n. Theefoe, one cn pove tht βm is n identifying of s i, in the following sense: if the implementtion mchine M I pplying βm poduces the sme output s tht poduced y the specifiction mchine stting fom s i, then M I hs stte tht is simil to s i nd such stte is the stte ight efoe the ppliction of the lst w m (egdless of which stte M I stted fom). We indicte the identifying fo stte s i with Ii. Once we hve computed the identifying fo evey stte, we cn pply method simil to tht eplined in fome section to visit ech stte, to confim the esponse of the mchine to the Length nd Cost: Identifying lengths gows eponentilly with the nume of septing s nd with n the nume of the sttes. Indeed, y eqution 2, evey βi is n times longe thn βi, the identifying I is equl to βm, the nume of septing s is epesented y m, nd tht cn e up to n. The esulting checking is eponentilly long. We cn optimize the IS method y using diffeent septing fmily Z i fo evey stte s i [2][4]. RESULTS The W, Wp, UIOv, nd DS methods detect fults of ny kind, while the UIO method my miss some fults. Methods W, Wp, nd DS with n dptive distinguishing poduce minimum cost while the othes hve gete cost. IJCTA Mch-Apil 24 Aville online@ 444

11 ISSN: If the sttus messge is not ville (which is mostly occus in softwe lck o testing), then we should use some et inputs to veify the sttes nd tht inputs should e unique, like in Wp, UIO nd DS. Asent messge Sttus messge Reset messge Not even Distinguishin g No UIOs Tle2. summey fo choosing est method Futue wok Pesent messge Reset messge Distinguishin g Method to use W, Wp, UIO(Unique Input Output), DS (Distinguishin g ) DS method uses tnsfe insted of eset Identifying IS (not coveed) checking Length nd cost Length O(pn3) Cost O(pn3) (the minimum Cost) Length O(pn3) Cost O(pn3) when used in conjunction with dptive distinguishin g It poduces eponentill y long checking The min wekness of some methods is tht it needs the set messge, which my not e ville. To void the use of set nd to possily shoten the test suite, we cn genete tht tveses the mchine nd thow evey stte nd evey tnsition t lest once without needing to estt nd get ck to the initil stte fte ech test nd without using set messge. Such is clled tnsition tou[3] which cn e used nd comped with ou eplined methods. Conclusions Hnn Ndeem et l, Int.J.Compute Technology & Applictions,Vol 5 (2), Two mchines M s nd M i e equivlent if they will poduce the sme output fo evey input, we looking fo checking tht pove tht the two mchines e equl. Thee e mny methods fo geneting checking nd some of them equie only tht ll sttes e echle fom the initil one, pemit the mchines with dedlocks o sttes without ny eiting tnsition. Anywise, these methods must equie eset messge tht tke ck the mchine to its initil stte, futhemoe dedlock my stop the test epeiment. Ou methods depend on the pesent o sent of set, eset, nd sttus messges s i [2][3]. Refeences [] Lee, D.; Ynnkkis, Mihlis, "Pinciples nd methods of testing finite stte mchines- suvey," Poceedings of the IEEE, vol.84, no.8, pp.9,23, Aug 996 doi:.9/ [2] Lee, D.; Ynnkkis, Mihlis, "Testing finitestte mchines: stte identifiction nd veifiction," Computes, IEEE Tnsctions on, vol.43, no.3, pp.36,32, M 994 doi:.9/ [3] Chow, T.S., "Testing Softwe Design Modeled y Finite-Stte Mchines," Softwe Engineeing, IEEE Tnsctions on, vol.se-4, no.3, pp.78,87, My 978 doi:.9/tse [4] Fujiw, S.; v.bochmnn, G.; Khendek, F.; Amlou, M.; Ghedmsi, A., "Test selection sed on finite stte models," Softwe Engineeing, IEEE Tnsctions on, vol.7, no.6, pp.59,63, Jun 99 doi:.9/ [5] Kishn Snni nd Anton Dhu A new technique fo geneting potocol test. SIGCOMM Comput. Commun. Rev. 5, 4 (Septeme 985), [6] Yu, S.S.; Liu, M.T., "A new potocol test genetion method sed on UIOS," INFOCOM '92. Eleventh Annul Joint Confeence of the IEEE Compute nd Communictions Societies, IEEE, vol., no., pp.268,277 vol.3, 4-8 My 992 [7] Sidhu, D.; Leung, T.-K., "Foml methods fo potocol testing: detiled study," Softwe Engineeing, IEEE Tnsctions on, vol.5, no.4, pp.43,426, Ap 989 doi:.9/ [8] Dn Angluin Lening egul sets fom queies nd counteemples. Inf. Comput. 75, 2 (Noveme 987), [9] Roth, J.P., "Dignosis of Automt Filues: A Clculus nd Method," IBM Jounl of Resech nd Development, vol., no.4, pp.278,29, July 966 doi:.47/d [] Hennine, F. C., "Fult detecting epeiments fo sequentil cicuits," Switching Cicuit Theoy nd Logicl Design, 964 Poceedings of the Fifth Annul Symposium on, vol., no., pp.95,, -3 Nov. 964 IJCTA Mch-Apil 24 Aville online@ 445

12 ISSN: Hnn Ndeem et l, Int.J.Compute Technology & Applictions,Vol 5 (2), [] "Chpte 2 Deteministic Finite Automt DFA include Lectue 3..." Inset Nme of Site in Itlics. N.p., n.d. We. 22 Fe. 24 < pte-2-deteministic-finite-automt-dfainclude-lectue-3-nd-4-finite-automt-ndegul-sets-lnguges-sttes-nd-tnsitions>. [2] "Finite Stte Automt nd Mophogmmtics.n." Inset Nme of Site in Itlics. N.p., n.d. We. 22 Fe. 24 < MophoFSM/Finite%2Stte%2Mch ines%2nd%2mophogmmtics. html_>. [3] "4ConfomnceTesting - unig.it." Inset Nme of Site in Itlics. N.p., n.d. We. 22 Fe. 24 < ch/ppes/motes5.pdf_>. [4] "4ConfomnceTesting - unig.it." Inset Nme of Site in Itlics. N.p., n.d. We. 26 Fe. 24 < ch/ppes/motes5.pdf_>. [5] "Confomnce Testing. - ResechGte." Inset Nme of Site in Itlics. N.p., n.d. We. M. 24 < tion/ _confomnce_testi ng_> IJCTA Mch-Apil 24 Aville online@ 446

Chapter 7. Kleene s Theorem. 7.1 Kleene s Theorem. The following theorem is the most important and fundamental result in the theory of FA s:

Chapter 7. Kleene s Theorem. 7.1 Kleene s Theorem. The following theorem is the most important and fundamental result in the theory of FA s: Chpte 7 Kleene s Theoem 7.1 Kleene s Theoem The following theoem is the most impotnt nd fundmentl esult in the theoy of FA s: Theoem 6 Any lnguge tht cn e defined y eithe egul expession, o finite utomt,

More information

Language Processors F29LP2, Lecture 5

Language Processors F29LP2, Lecture 5 Lnguge Pocessos F29LP2, Lectue 5 Jmie Gy Feuy 2, 2014 1 / 1 Nondeteministic Finite Automt (NFA) NFA genelise deteministic finite utomt (DFA). They llow sevel (0, 1, o moe thn 1) outgoing tnsitions with

More information

2-Way Finite Automata Radboud University, Nijmegen. Writer: Serena Rietbergen, s Supervisor: Herman Geuvers

2-Way Finite Automata Radboud University, Nijmegen. Writer: Serena Rietbergen, s Supervisor: Herman Geuvers 2-Wy Finite Automt Rdoud Univesity, Nijmegen Wite: Seen Rietegen, s4182804 Supeviso: Hemn Geuves Acdemic Ye 2017-2018 Contents 1 Intoduction 3 2 One wy utomt, deteministic nd non-deteministic 5 3 Ovehed

More information

Week 8. Topic 2 Properties of Logarithms

Week 8. Topic 2 Properties of Logarithms Week 8 Topic 2 Popeties of Logithms 1 Week 8 Topic 2 Popeties of Logithms Intoduction Since the esult of ithm is n eponent, we hve mny popeties of ithms tht e elted to the popeties of eponents. They e

More information

10 Statistical Distributions Solutions

10 Statistical Distributions Solutions Communictions Engineeing MSc - Peliminy Reding 1 Sttisticl Distiutions Solutions 1) Pove tht the vince of unifom distiution with minimum vlue nd mximum vlue ( is ) 1. The vince is the men of the sques

More information

Convert the NFA into DFA

Convert the NFA into DFA Convert the NF into F For ech NF we cn find F ccepting the sme lnguge. The numer of sttes of the F could e exponentil in the numer of sttes of the NF, ut in prctice this worst cse occurs rrely. lgorithm:

More information

Discrete Model Parametrization

Discrete Model Parametrization Poceedings of Intentionl cientific Confeence of FME ession 4: Automtion Contol nd Applied Infomtics Ppe 9 Discete Model Pmetition NOKIEVIČ, Pet Doc,Ing,Cc Deptment of Contol ystems nd Instumenttion, Fculty

More information

Deterministic simulation of a NFA with k symbol lookahead

Deterministic simulation of a NFA with k symbol lookahead Deteministic simultion of NFA with k symbol lookhed SOFSEM 7 Bl Rvikum, Clifoni Stte Univesity (joint wok with Nic Snten, Univesity of Wteloo) Oveview Definitions: DFA, NFA nd lookhed DFA Motivtion: utomted

More information

9.4 The response of equilibrium to temperature (continued)

9.4 The response of equilibrium to temperature (continued) 9.4 The esponse of equilibium to tempetue (continued) In the lst lectue, we studied how the chemicl equilibium esponds to the vition of pessue nd tempetue. At the end, we deived the vn t off eqution: d

More information

Minimal DFA. minimal DFA for L starting from any other

Minimal DFA. minimal DFA for L starting from any other Miniml DFA Among the mny DFAs ccepting the sme regulr lnguge L, there is exctly one (up to renming of sttes) which hs the smllest possile numer of sttes. Moreover, it is possile to otin tht miniml DFA

More information

( ) D x ( s) if r s (3) ( ) (6) ( r) = d dr D x

( ) D x ( s) if r s (3) ( ) (6) ( r) = d dr D x SIO 22B, Rudnick dpted fom Dvis III. Single vile sttistics The next few lectues e intended s eview of fundmentl sttistics. The gol is to hve us ll speking the sme lnguge s we move to moe dvnced topics.

More information

Lecture 14. Protocols. Key Distribution Center (KDC) or Trusted Third Party (TTP) KDC generates R1

Lecture 14. Protocols. Key Distribution Center (KDC) or Trusted Third Party (TTP) KDC generates R1 Lectue 14 Potocols 1 Key Distiution Cente (KDC) o Tusted Thid Pty (TTP) KDC genetes R1 lice otins R1 Msg1: K () Msg2: K (R1 K (R1) ) Msg3: K (R1) o otins R1 nd knows to use s key fo communicting with lice

More information

1 Nondeterministic Finite Automata

1 Nondeterministic Finite Automata 1 Nondeterministic Finite Automt Suppose in life, whenever you hd choice, you could try oth possiilities nd live your life. At the end, you would go ck nd choose the one tht worked out the est. Then you

More information

3.1 Magnetic Fields. Oersted and Ampere

3.1 Magnetic Fields. Oersted and Ampere 3.1 Mgnetic Fields Oested nd Ampee The definition of mgnetic induction, B Fields of smll loop (dipole) Mgnetic fields in mtte: ) feomgnetism ) mgnetiztion, (M ) c) mgnetic susceptiility, m d) mgnetic field,

More information

Michael Rotkowitz 1,2

Michael Rotkowitz 1,2 Novembe 23, 2006 edited Line Contolles e Unifomly Optiml fo the Witsenhusen Counteexmple Michel Rotkowitz 1,2 IEEE Confeence on Decision nd Contol, 2006 Abstct In 1968, Witsenhusen intoduced his celebted

More information

The Area of a Triangle

The Area of a Triangle The e of Tingle tkhlid June 1, 015 1 Intodution In this tile we will e disussing the vious methods used fo detemining the e of tingle. Let [X] denote the e of X. Using se nd Height To stt off, the simplest

More information

Class Summary. be functions and f( D) , we define the composition of f with g, denoted g f by

Class Summary. be functions and f( D) , we define the composition of f with g, denoted g f by Clss Summy.5 Eponentil Functions.6 Invese Functions nd Logithms A function f is ule tht ssigns to ech element D ectly one element, clled f( ), in. Fo emple : function not function Given functions f, g:

More information

Intermediate Math Circles Wednesday, November 14, 2018 Finite Automata II. Nickolas Rollick a b b. a b 4

Intermediate Math Circles Wednesday, November 14, 2018 Finite Automata II. Nickolas Rollick a b b. a b 4 Intermedite Mth Circles Wednesdy, Novemer 14, 2018 Finite Automt II Nickols Rollick nrollick@uwterloo.c Regulr Lnguges Lst time, we were introduced to the ide of DFA (deterministic finite utomton), one

More information

Discrete Mathematics and Logic II. Automata

Discrete Mathematics and Logic II. Automata Discete Mthemtics nd Logic II. Automt SFWR ENG 2FA3 Ryszd Jnicki Winte 2014 Acknowledgments: Mteil sed on Automt nd Computility y Dexte C. Kozen (Chpte 3). Ryszd Jnicki Discete Mthemtics nd Logic II. Automt

More information

5. (±±) Λ = fw j w is string of even lengthg [ 00 = f11,00g 7. (11 [ 00)± Λ = fw j w egins with either 11 or 00g 8. (0 [ ffl)1 Λ = 01 Λ [ 1 Λ 9.

5. (±±) Λ = fw j w is string of even lengthg [ 00 = f11,00g 7. (11 [ 00)± Λ = fw j w egins with either 11 or 00g 8. (0 [ ffl)1 Λ = 01 Λ [ 1 Λ 9. Regulr Expressions, Pumping Lemm, Right Liner Grmmrs Ling 106 Mrch 25, 2002 1 Regulr Expressions A regulr expression descries or genertes lnguge: it is kind of shorthnd for listing the memers of lnguge.

More information

Lecture 08: Feb. 08, 2019

Lecture 08: Feb. 08, 2019 4CS4-6:Theory of Computtion(Closure on Reg. Lngs., regex to NDFA, DFA to regex) Prof. K.R. Chowdhry Lecture 08: Fe. 08, 2019 : Professor of CS Disclimer: These notes hve not een sujected to the usul scrutiny

More information

Previously. Extensions to backstepping controller designs. Tracking using backstepping Suppose we consider the general system

Previously. Extensions to backstepping controller designs. Tracking using backstepping Suppose we consider the general system 436-459 Advnced contol nd utomtion Extensions to bckstepping contolle designs Tcking Obseves (nonline dmping) Peviously Lst lectue we looked t designing nonline contolles using the bckstepping technique

More information

CMPSCI 250: Introduction to Computation. Lecture #31: What DFA s Can and Can t Do David Mix Barrington 9 April 2014

CMPSCI 250: Introduction to Computation. Lecture #31: What DFA s Can and Can t Do David Mix Barrington 9 April 2014 CMPSCI 250: Introduction to Computtion Lecture #31: Wht DFA s Cn nd Cn t Do Dvid Mix Brrington 9 April 2014 Wht DFA s Cn nd Cn t Do Deterministic Finite Automt Forml Definition of DFA s Exmples of DFA

More information

First Midterm Examination

First Midterm Examination 24-25 Fll Semester First Midterm Exmintion ) Give the stte digrm of DFA tht recognizes the lnguge A over lphet Σ = {, } where A = {w w contins or } 2) The following DFA recognizes the lnguge B over lphet

More information

1. For each of the following theorems, give a two or three sentence sketch of how the proof goes or why it is not true.

1. For each of the following theorems, give a two or three sentence sketch of how the proof goes or why it is not true. York University CSE 2 Unit 3. DFA Clsses Converting etween DFA, NFA, Regulr Expressions, nd Extended Regulr Expressions Instructor: Jeff Edmonds Don t chet y looking t these nswers premturely.. For ech

More information

Topics for Review for Final Exam in Calculus 16A

Topics for Review for Final Exam in Calculus 16A Topics fo Review fo Finl Em in Clculus 16A Instucto: Zvezdelin Stnkov Contents 1. Definitions 1. Theoems nd Poblem Solving Techniques 1 3. Eecises to Review 5 4. Chet Sheet 5 1. Definitions Undestnd the

More information

U>, and is negative. Electric Potential Energy

U>, and is negative. Electric Potential Energy Electic Potentil Enegy Think of gvittionl potentil enegy. When the lock is moved veticlly up ginst gvity, the gvittionl foce does negtive wok (you do positive wok), nd the potentil enegy (U) inceses. When

More information

Finite Automata-cont d

Finite Automata-cont d Automt Theory nd Forml Lnguges Professor Leslie Lnder Lecture # 6 Finite Automt-cont d The Pumping Lemm WEB SITE: http://ingwe.inghmton.edu/ ~lnder/cs573.html Septemer 18, 2000 Exmple 1 Consider L = {ww

More information

Assignment 1 Automata, Languages, and Computability. 1 Finite State Automata and Regular Languages

Assignment 1 Automata, Languages, and Computability. 1 Finite State Automata and Regular Languages Deprtment of Computer Science, Austrlin Ntionl University COMP2600 Forml Methods for Softwre Engineering Semester 2, 206 Assignment Automt, Lnguges, nd Computility Smple Solutions Finite Stte Automt nd

More information

Data Structures. Element Uniqueness Problem. Hash Tables. Example. Hash Tables. Dana Shapira. 19 x 1. ) h(x 4. ) h(x 2. ) h(x 3. h(x 1. x 4. x 2.

Data Structures. Element Uniqueness Problem. Hash Tables. Example. Hash Tables. Dana Shapira. 19 x 1. ) h(x 4. ) h(x 2. ) h(x 3. h(x 1. x 4. x 2. Element Uniqueness Poblem Dt Stuctues Let x,..., xn < m Detemine whethe thee exist i j such tht x i =x j Sot Algoithm Bucket Sot Dn Shpi Hsh Tbles fo (i=;i

More information

Radial geodesics in Schwarzschild spacetime

Radial geodesics in Schwarzschild spacetime Rdil geodesics in Schwzschild spcetime Spheiclly symmetic solutions to the Einstein eqution tke the fom ds dt d dθ sin θdϕ whee is constnt. We lso hve the connection components, which now tke the fom using

More information

School of Electrical and Computer Engineering, Cornell University. ECE 303: Electromagnetic Fields and Waves. Fall 2007

School of Electrical and Computer Engineering, Cornell University. ECE 303: Electromagnetic Fields and Waves. Fall 2007 School of Electicl nd Compute Engineeing, Conell Univesity ECE 303: Electomgnetic Fields nd Wves Fll 007 Homewok 3 Due on Sep. 14, 007 by 5:00 PM Reding Assignments: i) Review the lectue notes. ii) Relevnt

More information

FI 2201 Electromagnetism

FI 2201 Electromagnetism FI 1 Electomgnetism Alexnde A. Isknd, Ph.D. Physics of Mgnetism nd Photonics Resech Goup Electosttics ELECTRIC PTENTIALS 1 Recll tht we e inteested to clculte the electic field of some chge distiution.

More information

Fourier-Bessel Expansions with Arbitrary Radial Boundaries

Fourier-Bessel Expansions with Arbitrary Radial Boundaries Applied Mthemtics,,, - doi:./m.. Pulished Online My (http://www.scirp.og/jounl/m) Astct Fouie-Bessel Expnsions with Aity Rdil Boundies Muhmmd A. Mushef P. O. Box, Jeddh, Sudi Ai E-mil: mmushef@yhoo.co.uk

More information

This immediately suggests an inverse-square law for a "piece" of current along the line.

This immediately suggests an inverse-square law for a piece of current along the line. Electomgnetic Theoy (EMT) Pof Rui, UNC Asheville, doctophys on YouTube Chpte T Notes The iot-svt Lw T nvese-sque Lw fo Mgnetism Compe the mgnitude of the electic field t distnce wy fom n infinite line

More information

A Bijective Approach to the Permutational Power of a Priority Queue

A Bijective Approach to the Permutational Power of a Priority Queue A Bijective Appoach to the Pemutational Powe of a Pioity Queue Ia M. Gessel Kuang-Yeh Wang Depatment of Mathematics Bandeis Univesity Waltham, MA 02254-9110 Abstact A pioity queue tansfoms an input pemutation

More information

Summary: Binomial Expansion...! r. where

Summary: Binomial Expansion...! r. where Summy: Biomil Epsio 009 M Teo www.techmejcmth-sg.wes.com ) Re-cp of Additiol Mthemtics Biomil Theoem... whee )!!(! () The fomul is ville i MF so studets do ot eed to memoise it. () The fomul pplies oly

More information

Chapter Five: Nondeterministic Finite Automata. Formal Language, chapter 5, slide 1

Chapter Five: Nondeterministic Finite Automata. Formal Language, chapter 5, slide 1 Chpter Five: Nondeterministic Finite Automt Forml Lnguge, chpter 5, slide 1 1 A DFA hs exctly one trnsition from every stte on every symol in the lphet. By relxing this requirement we get relted ut more

More information

Name Ima Sample ASU ID

Name Ima Sample ASU ID Nme Im Smple ASU ID 2468024680 CSE 355 Test 1, Fll 2016 30 Septemer 2016, 8:35-9:25.m., LSA 191 Regrding of Midterms If you elieve tht your grde hs not een dded up correctly, return the entire pper to

More information

AUTOMATA AND LANGUAGES. Definition 1.5: Finite Automaton

AUTOMATA AND LANGUAGES. Definition 1.5: Finite Automaton 25. Finite Automt AUTOMATA AND LANGUAGES A system of computtion tht only hs finite numer of possile sttes cn e modeled using finite utomton A finite utomton is often illustrted s stte digrm d d d. d q

More information

Worked out examples Finite Automata

Worked out examples Finite Automata Worked out exmples Finite Automt Exmple Design Finite Stte Automton which reds inry string nd ccepts only those tht end with. Since we re in the topic of Non Deterministic Finite Automt (NFA), we will

More information

π,π is the angle FROM a! TO b

π,π is the angle FROM a! TO b Mth 151: 1.2 The Dot Poduct We hve scled vectos (o, multiplied vectos y el nume clled scl) nd dded vectos (in ectngul component fom). Cn we multiply vectos togethe? The nswe is YES! In fct, thee e two

More information

Math 4318 : Real Analysis II Mid-Term Exam 1 14 February 2013

Math 4318 : Real Analysis II Mid-Term Exam 1 14 February 2013 Mth 4318 : Rel Anlysis II Mid-Tem Exm 1 14 Febuy 2013 Nme: Definitions: Tue/Flse: Poofs: 1. 2. 3. 4. 5. 6. Totl: Definitions nd Sttements of Theoems 1. (2 points) Fo function f(x) defined on (, b) nd fo

More information

Regular expressions, Finite Automata, transition graphs are all the same!!

Regular expressions, Finite Automata, transition graphs are all the same!! CSI 3104 /Winter 2011: Introduction to Forml Lnguges Chpter 7: Kleene s Theorem Chpter 7: Kleene s Theorem Regulr expressions, Finite Automt, trnsition grphs re ll the sme!! Dr. Neji Zgui CSI3104-W11 1

More information

On the Eötvös effect

On the Eötvös effect On the Eötvös effect Mugu B. Răuţ The im of this ppe is to popose new theoy bout the Eötvös effect. We develop mthemticl model which loud us bette undestnding of this effect. Fom the eqution of motion

More information

First Midterm Examination

First Midterm Examination Çnky University Deprtment of Computer Engineering 203-204 Fll Semester First Midterm Exmintion ) Design DFA for ll strings over the lphet Σ = {,, c} in which there is no, no nd no cc. 2) Wht lnguge does

More information

Designing finite automata II

Designing finite automata II Designing finite utomt II Prolem: Design DFA A such tht L(A) consists of ll strings of nd which re of length 3n, for n = 0, 1, 2, (1) Determine wht to rememer out the input string Assign stte to ech of

More information

Harvard University Computer Science 121 Midterm October 23, 2012

Harvard University Computer Science 121 Midterm October 23, 2012 Hrvrd University Computer Science 121 Midterm Octoer 23, 2012 This is closed-ook exmintion. You my use ny result from lecture, Sipser, prolem sets, or section, s long s you quote it clerly. The lphet is

More information

Formal Languages and Automata

Formal Languages and Automata Moile Computing nd Softwre Engineering p. 1/5 Forml Lnguges nd Automt Chpter 2 Finite Automt Chun-Ming Liu cmliu@csie.ntut.edu.tw Deprtment of Computer Science nd Informtion Engineering Ntionl Tipei University

More information

Section 4: Integration ECO4112F 2011

Section 4: Integration ECO4112F 2011 Reding: Ching Chpter Section : Integrtion ECOF Note: These notes do not fully cover the mteril in Ching, ut re ment to supplement your reding in Ching. Thus fr the optimistion you hve covered hs een sttic

More information

Section 35 SHM and Circular Motion

Section 35 SHM and Circular Motion Section 35 SHM nd Cicul Motion Phsics 204A Clss Notes Wht do objects do? nd Wh do the do it? Objects sometimes oscillte in simple hmonic motion. In the lst section we looed t mss ibting t the end of sping.

More information

Chapter 2 Finite Automata

Chapter 2 Finite Automata Chpter 2 Finite Automt 28 2.1 Introduction Finite utomt: first model of the notion of effective procedure. (They lso hve mny other pplictions). The concept of finite utomton cn e derived y exmining wht

More information

Nondeterminism and Nodeterministic Automata

Nondeterminism and Nodeterministic Automata Nondeterminism nd Nodeterministic Automt 61 Nondeterminism nd Nondeterministic Automt The computtionl mchine models tht we lerned in the clss re deterministic in the sense tht the next move is uniquely

More information

Optimization. x = 22 corresponds to local maximum by second derivative test

Optimization. x = 22 corresponds to local maximum by second derivative test Optimiztion Lectue 17 discussed the exteme vlues of functions. This lectue will pply the lesson fom Lectue 17 to wod poblems. In this section, it is impotnt to emembe we e in Clculus I nd e deling one-vible

More information

Review of Mathematical Concepts

Review of Mathematical Concepts ENEE 322: Signls nd Systems view of Mthemticl Concepts This hndout contins ief eview of mthemticl concepts which e vitlly impotnt to ENEE 322: Signls nd Systems. Since this mteil is coveed in vious couses

More information

Converting Regular Expressions to Discrete Finite Automata: A Tutorial

Converting Regular Expressions to Discrete Finite Automata: A Tutorial Converting Regulr Expressions to Discrete Finite Automt: A Tutoril Dvid Christinsen 2013-01-03 This is tutoril on how to convert regulr expressions to nondeterministic finite utomt (NFA) nd how to convert

More information

Probabilistic Retrieval

Probabilistic Retrieval CS 630 Lectue 4: 02/07/2006 Lectue: Lillin Lee Scibes: Pete Bbinski, Dvid Lin Pobbilistic Retievl I. Nïve Beginnings. Motivtions b. Flse Stt : A Pobbilistic Model without Vition? II. Fomultion. Tems nd

More information

ITI Introduction to Computing II

ITI Introduction to Computing II ITI 1121. Intoduction to Computing II Mcel Tucotte School of Electicl Engineeing nd Compute Science Abstct dt type: Stck Stck-bsed lgoithms Vesion of Febuy 2, 2013 Abstct These lectue notes e ment to be

More information

Coalgebra, Lecture 15: Equations for Deterministic Automata

Coalgebra, Lecture 15: Equations for Deterministic Automata Colger, Lecture 15: Equtions for Deterministic Automt Julin Slmnc (nd Jurrin Rot) Decemer 19, 2016 In this lecture, we will study the concept of equtions for deterministic utomt. The notes re self contined

More information

Lexical Analysis Finite Automate

Lexical Analysis Finite Automate Lexicl Anlysis Finite Automte CMPSC 470 Lecture 04 Topics: Deterministic Finite Automt (DFA) Nondeterministic Finite Automt (NFA) Regulr Expression NFA DFA A. Finite Automt (FA) FA re grph, like trnsition

More information

School of Electrical and Computer Engineering, Cornell University. ECE 303: Electromagnetic Fields and Waves. Fall 2007

School of Electrical and Computer Engineering, Cornell University. ECE 303: Electromagnetic Fields and Waves. Fall 2007 School of Electicl nd Compute Engineeing, Conell Univesity ECE 303: Electomgnetic Fields nd Wves Fll 007 Homewok 4 Due on Sep. 1, 007 by 5:00 PM Reding Assignments: i) Review the lectue notes. ii) Relevnt

More information

Homework 4. 0 ε 0. (00) ε 0 ε 0 (00) (11) CS 341: Foundations of Computer Science II Prof. Marvin Nakayama

Homework 4. 0 ε 0. (00) ε 0 ε 0 (00) (11) CS 341: Foundations of Computer Science II Prof. Marvin Nakayama CS 341: Foundtions of Computer Science II Prof. Mrvin Nkym Homework 4 1. UsetheproceduredescriedinLemm1.55toconverttheregulrexpression(((00) (11)) 01) into n NFA. Answer: 0 0 1 1 00 0 0 11 1 1 01 0 1 (00)

More information

10.3 The Quadratic Formula

10.3 The Quadratic Formula . Te Qudti Fomul We mentioned in te lst setion tt ompleting te sque n e used to solve ny qudti eqution. So we n use it to solve 0. We poeed s follows 0 0 Te lst line of tis we ll te qudti fomul. Te Qudti

More information

CSCI 340: Computational Models. Kleene s Theorem. Department of Computer Science

CSCI 340: Computational Models. Kleene s Theorem. Department of Computer Science CSCI 340: Computtionl Models Kleene s Theorem Chpter 7 Deprtment of Computer Science Unifiction In 1954, Kleene presented (nd proved) theorem which (in our version) sttes tht if lnguge cn e defined y ny

More information

3 Regular expressions

3 Regular expressions 3 Regulr expressions Given n lphet Σ lnguge is set of words L Σ. So fr we were le to descrie lnguges either y using set theory (i.e. enumertion or comprehension) or y n utomton. In this section we shll

More information

Electronic Supplementary Material

Electronic Supplementary Material Electonic Supplementy Mteil On the coevolution of socil esponsiveness nd behvioul consistency Mx Wolf, G Snde vn Doon & Fnz J Weissing Poc R Soc B 78, 440-448; 0 Bsic set-up of the model Conside the model

More information

2.4 Linear Inequalities and Interval Notation

2.4 Linear Inequalities and Interval Notation .4 Liner Inequlities nd Intervl Nottion We wnt to solve equtions tht hve n inequlity symol insted of n equl sign. There re four inequlity symols tht we will look t: Less thn , Less thn or

More information

Homework Solution - Set 5 Due: Friday 10/03/08

Homework Solution - Set 5 Due: Friday 10/03/08 CE 96 Introduction to the Theory of Computtion ll 2008 Homework olution - et 5 Due: ridy 10/0/08 1. Textook, Pge 86, Exercise 1.21. () 1 2 Add new strt stte nd finl stte. Mke originl finl stte non-finl.

More information

Homework 3 Solutions

Homework 3 Solutions CS 341: Foundtions of Computer Science II Prof. Mrvin Nkym Homework 3 Solutions 1. Give NFAs with the specified numer of sttes recognizing ech of the following lnguges. In ll cses, the lphet is Σ = {,1}.

More information

CS 275 Automata and Formal Language Theory

CS 275 Automata and Formal Language Theory CS 275 utomt nd Forml Lnguge Theory Course Notes Prt II: The Recognition Prolem (II) Chpter II.5.: Properties of Context Free Grmmrs (14) nton Setzer (Bsed on ook drft y J. V. Tucker nd K. Stephenson)

More information

CSCI 340: Computational Models. Transition Graphs. Department of Computer Science

CSCI 340: Computational Models. Transition Graphs. Department of Computer Science CSCI 340: Computtionl Models Trnsition Grphs Chpter 6 Deprtment of Computer Science Relxing Restrints on Inputs We cn uild n FA tht ccepts only the word! 5 sttes ecuse n FA cn only process one letter t

More information

Languages & Automata

Languages & Automata Lnguges & Automt Dr. Lim Nughton Lnguges A lnguge is sed on n lphet which is finite set of smols such s {, } or {, } or {,..., z}. If Σ is n lphet, string over Σ is finite sequence of letters from Σ, (strings

More information

CS375: Logic and Theory of Computing

CS375: Logic and Theory of Computing CS375: Logic nd Theory of Computing Fuhu (Frnk) Cheng Deprtment of Computer Science University of Kentucky 1 Tle of Contents: Week 1: Preliminries (set lger, reltions, functions) (red Chpters 1-4) Weeks

More information

CS415 Compilers. Lexical Analysis and. These slides are based on slides copyrighted by Keith Cooper, Ken Kennedy & Linda Torczon at Rice University

CS415 Compilers. Lexical Analysis and. These slides are based on slides copyrighted by Keith Cooper, Ken Kennedy & Linda Torczon at Rice University CS415 Compilers Lexicl Anlysis nd These slides re sed on slides copyrighted y Keith Cooper, Ken Kennedy & Lind Torczon t Rice University First Progrmming Project Instruction Scheduling Project hs een posted

More information

CS103B Handout 18 Winter 2007 February 28, 2007 Finite Automata

CS103B Handout 18 Winter 2007 February 28, 2007 Finite Automata CS103B ndout 18 Winter 2007 Ferury 28, 2007 Finite Automt Initil text y Mggie Johnson. Introduction Severl childrens gmes fit the following description: Pieces re set up on plying ord; dice re thrown or

More information

Fluids & Bernoulli s Equation. Group Problems 9

Fluids & Bernoulli s Equation. Group Problems 9 Goup Poblems 9 Fluids & Benoulli s Eqution Nme This is moe tutoil-like thn poblem nd leds you though conceptul development of Benoulli s eqution using the ides of Newton s 2 nd lw nd enegy. You e going

More information

CMSC 330: Organization of Programming Languages

CMSC 330: Organization of Programming Languages CMSC 330: Orgniztion of Progrmming Lnguges Finite Automt 2 CMSC 330 1 Types of Finite Automt Deterministic Finite Automt (DFA) Exctly one sequence of steps for ech string All exmples so fr Nondeterministic

More information

Energy Dissipation Gravitational Potential Energy Power

Energy Dissipation Gravitational Potential Energy Power Lectue 4 Chpte 8 Physics I 0.8.03 negy Dissiption Gvittionl Potentil negy Powe Couse wesite: http://fculty.uml.edu/andiy_dnylov/teching/physicsi Lectue Cptue: http://echo360.uml.edu/dnylov03/physicsfll.html

More information

CS 311 Homework 3 due 16:30, Thursday, 14 th October 2010

CS 311 Homework 3 due 16:30, Thursday, 14 th October 2010 CS 311 Homework 3 due 16:30, Thursdy, 14 th Octoer 2010 Homework must e sumitted on pper, in clss. Question 1. [15 pts.; 5 pts. ech] Drw stte digrms for NFAs recognizing the following lnguges:. L = {w

More information

p-adic Egyptian Fractions

p-adic Egyptian Fractions p-adic Egyptin Frctions Contents 1 Introduction 1 2 Trditionl Egyptin Frctions nd Greedy Algorithm 2 3 Set-up 3 4 p-greedy Algorithm 5 5 p-egyptin Trditionl 10 6 Conclusion 1 Introduction An Egyptin frction

More information

NFA DFA Example 3 CMSC 330: Organization of Programming Languages. Equivalence of DFAs and NFAs. Equivalence of DFAs and NFAs (cont.

NFA DFA Example 3 CMSC 330: Organization of Programming Languages. Equivalence of DFAs and NFAs. Equivalence of DFAs and NFAs (cont. NFA DFA Exmple 3 CMSC 330: Orgniztion of Progrmming Lnguges NFA {B,D,E {A,E {C,D {E Finite Automt, con't. R = { {A,E, {B,D,E, {C,D, {E 2 Equivlence of DFAs nd NFAs Any string from {A to either {D or {CD

More information

CS 373, Spring Solutions to Mock midterm 1 (Based on first midterm in CS 273, Fall 2008.)

CS 373, Spring Solutions to Mock midterm 1 (Based on first midterm in CS 273, Fall 2008.) CS 373, Spring 29. Solutions to Mock midterm (sed on first midterm in CS 273, Fll 28.) Prolem : Short nswer (8 points) The nswers to these prolems should e short nd not complicted. () If n NF M ccepts

More information

Lecture 3. In this lecture, we will discuss algorithms for solving systems of linear equations.

Lecture 3. In this lecture, we will discuss algorithms for solving systems of linear equations. Lecture 3 3 Solving liner equtions In this lecture we will discuss lgorithms for solving systems of liner equtions Multiplictive identity Let us restrict ourselves to considering squre mtrices since one

More information

Let's start with an example:

Let's start with an example: Finite Automt Let's strt with n exmple: Here you see leled circles tht re sttes, nd leled rrows tht re trnsitions. One of the sttes is mrked "strt". One of the sttes hs doule circle; this is terminl stte

More information

Suggested t-z and q-z functions for load-movement responsef

Suggested t-z and q-z functions for load-movement responsef 40 Rtio (Exponent = 0.5 80 % Fnction (.5 times 0 Hypeolic ( = 0 % SHAFT SHEAR (% of lt 00 80 60 ULT Zhng = 0.0083 / = 50 % Exponentil (e = 0.45 80 % (stin-softening 40 0 0 0 5 0 5 0 5 RELATIVE MOVEMENT

More information

ɛ-closure, Kleene s Theorem,

ɛ-closure, Kleene s Theorem, DEGefW5wiGH2XgYMEzUKjEmtCDUsRQ4d 1 A nice pper relevnt to this course is titled The Glory of the Pst 2 NICTA Resercher, Adjunct t the Austrlin Ntionl University nd Griffith University ɛ-closure, Kleene

More information

(a) Counter-Clockwise (b) Clockwise ()N (c) No rotation (d) Not enough information

(a) Counter-Clockwise (b) Clockwise ()N (c) No rotation (d) Not enough information m m m00 kg dult, m0 kg bby. he seesw stts fom est. Which diection will it ottes? ( Counte-Clockwise (b Clockwise ( (c o ottion ti (d ot enough infomtion Effect of Constnt et oque.3 A constnt non-zeo toque

More information

CISC 4090 Theory of Computation

CISC 4090 Theory of Computation 9/6/28 Stereotypicl computer CISC 49 Theory of Computtion Finite stte mchines & Regulr lnguges Professor Dniel Leeds dleeds@fordhm.edu JMH 332 Centrl processing unit (CPU) performs ll the instructions

More information

CS 330 Formal Methods and Models

CS 330 Formal Methods and Models CS 330 Forml Methods nd Models Dn Richrds, George Mson University, Spring 2017 Quiz Solutions Quiz 1, Propositionl Logic Dte: Ferury 2 1. Prove ((( p q) q) p) is tutology () (3pts) y truth tle. p q p q

More information

I1 = I2 I1 = I2 + I3 I1 + I2 = I3 + I4 I 3

I1 = I2 I1 = I2 + I3 I1 + I2 = I3 + I4 I 3 2 The Prllel Circuit Electric Circuits: Figure 2- elow show ttery nd multiple resistors rrnged in prllel. Ech resistor receives portion of the current from the ttery sed on its resistnce. The split is

More information

Grammar. Languages. Content 5/10/16. Automata and Languages. Regular Languages. Regular Languages

Grammar. Languages. Content 5/10/16. Automata and Languages. Regular Languages. Regular Languages 5//6 Grmmr Automt nd Lnguges Regulr Grmmr Context-free Grmmr Context-sensitive Grmmr Prof. Mohmed Hmd Softwre Engineering L. The University of Aizu Jpn Regulr Lnguges Context Free Lnguges Context Sensitive

More information

Types of Finite Automata. CMSC 330: Organization of Programming Languages. Comparing DFAs and NFAs. NFA for (a b)*abb.

Types of Finite Automata. CMSC 330: Organization of Programming Languages. Comparing DFAs and NFAs. NFA for (a b)*abb. CMSC 330: Orgniztion of Progrmming Lnguges Finite Automt 2 Types of Finite Automt Deterministic Finite Automt () Exctly one sequence of steps for ech string All exmples so fr Nondeterministic Finite Automt

More information

dx was area under f ( x ) if ( ) 0

dx was area under f ( x ) if ( ) 0 13. Line Integls Line integls e simil to single integl, f ( x) dx ws e unde f ( x ) if ( ) 0 Insted of integting ove n intevl [, ] (, ) f xy ds f x., we integte ove cuve, (in the xy-plne). **Figue - get

More information

10 m, so the distance from the Sun to the Moon during a solar eclipse is. The mass of the Sun, Earth, and Moon are = =

10 m, so the distance from the Sun to the Moon during a solar eclipse is. The mass of the Sun, Earth, and Moon are = = Chpte 1 nivesl Gvittion 11 *P1. () The un-th distnce is 1.4 nd the th-moon 8 distnce is.84, so the distnce fom the un to the Moon duing sol eclipse is 11 8 11 1.4.84 = 1.4 The mss of the un, th, nd Moon

More information

Types of Finite Automata. CMSC 330: Organization of Programming Languages. Comparing DFAs and NFAs. Comparing DFAs and NFAs (cont.) Finite Automata 2

Types of Finite Automata. CMSC 330: Organization of Programming Languages. Comparing DFAs and NFAs. Comparing DFAs and NFAs (cont.) Finite Automata 2 CMSC 330: Orgniztion of Progrmming Lnguges Finite Automt 2 Types of Finite Automt Deterministic Finite Automt () Exctly one sequence of steps for ech string All exmples so fr Nondeterministic Finite Automt

More information

Chapters Five Notes SN AA U1C5

Chapters Five Notes SN AA U1C5 Chpters Five Notes SN AA U1C5 Nme Period Section 5-: Fctoring Qudrtic Epressions When you took lger, you lerned tht the first thing involved in fctoring is to mke sure to fctor out ny numers or vriles

More information

Parse trees, ambiguity, and Chomsky normal form

Parse trees, ambiguity, and Chomsky normal form Prse trees, miguity, nd Chomsky norml form In this lecture we will discuss few importnt notions connected with contextfree grmmrs, including prse trees, miguity, nd specil form for context-free grmmrs

More information

CS 301. Lecture 04 Regular Expressions. Stephen Checkoway. January 29, 2018

CS 301. Lecture 04 Regular Expressions. Stephen Checkoway. January 29, 2018 CS 301 Lecture 04 Regulr Expressions Stephen Checkowy Jnury 29, 2018 1 / 35 Review from lst time NFA N = (Q, Σ, δ, q 0, F ) where δ Q Σ P (Q) mps stte nd n lphet symol (or ) to set of sttes We run n NFA

More information

State Minimization for DFAs

State Minimization for DFAs Stte Minimiztion for DFAs Red K & S 2.7 Do Homework 10. Consider: Stte Minimiztion 4 5 Is this miniml mchine? Step (1): Get rid of unrechle sttes. Stte Minimiztion 6, Stte is unrechle. Step (2): Get rid

More information

About Some Inequalities for Isotonic Linear Functionals and Applications

About Some Inequalities for Isotonic Linear Functionals and Applications Applied Mthemticl Sciences Vol. 8 04 no. 79 8909-899 HIKARI Ltd www.m-hiki.com http://dx.doi.og/0.988/ms.04.40858 Aout Some Inequlities fo Isotonic Line Functionls nd Applictions Loedn Ciudiu Deptment

More information