DNA Watson-Crick complementarity in computer science
|
|
- Nelson Lee
- 5 years ago
- Views:
Transcription
1 DNA Watson-Crick computer science Shnosuke Seki (Supervisor) Dr. Lila Kari Department Computer Science, University Western Ontario Ph.D. thesis defense public lecture August 9, 2010
2 Outle 1 2 Pseudo-primitivity 3 4 An Extended Fe and Wilf s Theorem 5 Extended Lyndon-Schützenberger equation 6
3 Path to the understandg DNA processg 1953 Watson and Crick discovered the DNA double helix. discoveries fundamental processg mechanisms livg organisms like DNA replication Adleman s first experiment molecular computg (DNA computg) 2003 Completion Human Genome Project 8/9/2010 one small step to the understandg DNA encodg
4 Encodg to DNA In molecular computg, DNA strands are ten employed as media for processg, storage, and transmission. DNA strand design Good DNA strands for molecular computg
5 Encodg to DNA In molecular computg, DNA strands are ten employed as media for processg, storage, and transmission. DNA strand design Good DNA strands for molecular computg Knowledge computer science codg theory theory etc.
6 Encodg to DNA In molecular computg, DNA strands are ten employed as media for processg, storage, and transmission. DNA strand design Good DNA strands for molecular computg Knowledge computer science codg theory theory etc. + Particularities DNA 4-letters Watson-Crick
7 Criteria DNA strand design Criteria DNA strand design [Sager & Stefanovic 2006] 1 no strand forms any undesired tra-molecular structure 2 no strand hybridizes with a strand any undesirable manner 3 no strand hybridizes with the WK-complement a strand any undesirable manner
8 Criteria DNA strand design Criteria DNA strand design [Sager & Stefanovic 2006] 1 no strand forms any undesired tra-molecular structure 2 no strand hybridizes with a strand any undesirable manner 3 no strand hybridizes with the WK-complement a strand any undesirable manner
9 DNA double helix & Watson-Crick Watson strand 5 A C T G 3 3 T G A C 5 Crick strand Due to Watson-Crick (WK) : A T, C G, Anti-parallelism, Two WK-complementary DNA sgle strands with opposite orientation can form a DNA double helix.
10 DNA replication DNA replication works the followg way: Watson strand Crick strand
11 DNA replication DNA replication works the followg way: Watson strand Crick strand
12 DNA replication DNA replication works the followg way: Watson strand Crick strand Watson strand Crick strand
13 DNA replication DNA replication works the followg way: Watson strand Crick strand Watson strand Crick strand N.B., the figure above lacks various important features DNA replication such as replication fork, Okazaki fragment, leadg and laggg strands, and DNA ligase. Observation Two WK-complementary strands are equivalent w.r.t. the they encode.
14 A mathematical model the equivalence and its generalization I Defition A mappg θ : Σ Σ is called an antimorphic volution if 1 for any x, y Σ, θ(xy) = θ(y)θ(x) (antimorphism), 2 θ θ is the identity (volutive). Watson-Crick (WK-) volution The antimorphic volution τ defed as τ(a) = T, τ(t) = A, τ(c) = G, τ(g) = C models WK-, and hence, called WK-volution. For stance, τ(actg) = τ(g)τ(act) = = τ(g)τ(t)τ(c)τ(a) = CAGT.
15 A mathematical model the equivalence and its generalization II Formalization the equivalence For any word u, consider u and its WK-complement τ(u) equivalent. Idea for generalization How about regardg u and θ(u) equivalent for any word u and any antimorphic volution θ?
16 Combatorics with affity for DNA computg Ultimate Goal Establish a system with notions and theorems combatorics on which can handle a word and its complement a uniform manner. The ma contribution this thesis We will generalize the classical notions power, repetition, and even primitivity this thesis. Example ACTGCAGTCAGT can be considered repetitive because it can be written as ACTGτ(ACTG) 2.
17 Importance applications Recall the above-mentioned criteria for DNA strand design. Criteria DNA strand design [Sager & Stefanovic 2006] 1 no strand forms any undesired tra-molecular structure 2 no strand hybridizes with a strand any undesirable manner 3 no strand hybridizes with the WK-complement a strand any undesirable manner
18 Importance applications Recall the above-mentioned criteria for DNA strand design. Criteria DNA strand design [Sager & Stefanovic 2006] 1 no strand forms any undesired tra-molecular structure 2 no strand hybridizes with a strand any undesirable manner 3 no strand hybridizes with the WK-complement a strand any undesirable manner Our results this thesis aim at providg uniform treatment 2nd and 3rd criteria.
19 Primitivity A word w Σ + is called a power u if w u +. Defition A word w Σ + is primitive if w = u k implies k = 1. The (unique) primitive word u Σ + with w u + is called the primitive root w, denoted by ρ(w). Example ACGT is primitive, while ACGTACGT is not; ρ(acgtacgt) = ACGT.
20 θ-primitivity We call a word the set u{u, θ(u)} a θ-power u. Defition We say that a word w Σ + is θ-primitive if for any u Σ +, w {u, θ(u)} k implies k = 1. Example For the WK-volution τ, ACGT is not τ-primitive because GT = τ(ac), and hence, ACGT = ACτ(AC).
21 Defition θ-primitive root Problem Can we defe the θ-primitive root a word w as the unique θ-primitive word t such that w t{t, θ(t)}? The answer is YES. The existence such t is trivial. Its uniqueness will be a corollary extended Fe and Wilf s theorem.
22 A relationship between primitivity and θ-primitivity primitive θ-primitive Proposition For any antimorphic volution θ, a θ-primitive word is primitive. Example ACGT is primitive but not τ-primitive for the WK-volution τ.
23 Defect I A well-known example defect On (x, y)-coordate, the condition y = x decreases the degree freedom by 1 (x is a free variable, and y becomes a bound variable).
24 Defect II For given and a system equations on them, if the system forces some the volved to be powers same word, then the system is said to possess the defect. Example uv = vu implies ρ(u) = ρ(v) (defect on u, v). Example ([Chfrut & Karhumäki 1997]) If a word u{u, v} and a word v{u, v} share a prefix length u + v, then ρ(u) = ρ(v).
25 problem Does a given system word equations force two u, v volved to be {t, θ(t)} for some word t? Theorem ([Czeizler, Kari, & Seki 2010]) ρ(u) = ρ(v) implies that u, v t{t, θ(t)} for some word t, and hence, has a weak defect on u and v.
26 Ma contributions to weak defect We vestigate the weak defect problem contexts 1 (extended) Fe and Wilf s theorem; 2 (extended) Lyndon-Schützenberger equation.
27 Ma contributions to weak defect We vestigate the weak defect problem contexts 1 (extended) Fe and Wilf s theorem; 2 (extended) Lyndon-Schützenberger equation.
28 What is the Fe and Wilf s theorem? u + v gcd( u, v ) u u v v v v v Theorem ([Fe & Wilf 1965]) If a power u and a power v share a prefix length u + v gcd( u, v ), then ρ(u) = ρ(v).
29 An extended Fe and Wilf s theorem α u? u or θ(u) u or θ(u) β v v or θ(v) v or θ(v) v or θ(v) v or θ(v) Problem How long prefix do α u{u, θ(u)} and β v{v, θ(v)} have to share to imply that u, v t{t, θ(t)} for some word t?
30 lcm( u, v ) u u or θ(u) u or θ(u) v v or θ(v) 1 [Czeizler, Kari, & Seki 2010] v or θ(v) If a θ-power u and a θ-power v share a prefix length lcm( u, v ), then u, v t{t, θ(t)} for some word t. Defition θ-primitive root [Czeizler, Kari, & Seki 2010] We can defe the θ-primitive root u, denoted by ρ θ (u), as a unique θ-primitive word t such that u t{t, θ(t)}.
31 2 [Czeizler, Kari, & Seki 2010] Let u, v Σ + with u v. If a θ-power u and a θ-power v share a prefix length 2 u + v gcd( u, v ), then u, v t{t, θ(t)} for some word t.
32 For two positive tegers p, q N (p q), let { lcm(p, q) if q 2 gcd(p, q) b(p, q) = 2p + q gcd(p, q) if q 3 gcd(p, q). extended Fe and Wilf s theorem If a θ-power u and a θ-power v share a prefix length b( u, v ), then u, v t{t, θ(t)} for some word t.
33 Optimality bounds for The bound for FW theorem is strong optimal [Constantescu & Ilie 2005] a sense: for any positive tegers p, q, one can construct u, v such that 1 u = p, v = q, ρ(u) ρ(v), 2 a power u and a power v share a prefix length u + v gcd( u, v ) 1. Problem Is b(p, q) strongly optimal? A partial (trivial?) positive answer b(p, q) is optimal for any p, q with p q = gcd(p, q). Negative answer [Kari & Seki 2010] b(p, q) is not strongly optimal.
34 A new bound for For p, q with p > q 2 gcd(p, q), let gcd(p, q) b (p, q) = b(p, q). 2 an improved [Kari & Seki 2010] Let u, v with u > v 2 gcd( u, v ). If a θ-power u and a θ-power v share a prefix length b ( u, v ), then u, v t{t, θ(t)} for some word t.
35 Optimality the new bound A partial positive answer For any p, q with p > q = 2 gcd(p, q), b (p, q) is optimal. iff condition for b (p, q) to be optimal for (p, q) Let u, v with u > v 3 gcd( u, v ), ρ θ (u) ρ θ (v), and gcd( u, v ) = 1. A θ-power u and a θ-power v share a prefix length b ( u, v ) 1 iff either 1 u = (ab(ba) i b) m ab and v = ab(ba) i b, or 2 u = [a(ba) i (ab) i+1 a] m a(ba) i ab and v = a(ba) i (ab) i+1 a for some m 1, i 0, and a, b Σ s.t. a = θ(a) and b = θ(b). Consequently, b (p, q) is NOT strongly optimal (e.g., it is not optimal for (9, 5)).
36 Optimality the new bound A partial positive answer For any p, q with p > q = 2 gcd(p, q), b (p, q) is optimal. iff condition for b (p, q) to be optimal for (p, q) Let u, v with u > v 3 gcd( u, v ), ρ θ (u) ρ θ (v), and gcd( u, v ) = 1. A θ-power u and a θ-power v share a prefix length b ( u, v ) 1 iff either 1 u = (ab(ba) i b) m ab and v = ab(ba) i b, or 2 u = [a(ba) i (ab) i+1 a] m a(ba) i ab and v = a(ba) i (ab) i+1 a for some m 1, i 0, and a, b Σ s.t. a = θ(a) and b = θ(b). Consequently, b (p, q) is NOT strongly optimal (e.g., it is not optimal for (9, 5)).
37 Ma contributions to weak defect We vestigate the weak defect problem contexts 1 (extended) Fe and Wilf s theorem; 2 (extended) Lyndon-Schützenberger equation.
38 Lyndon-Schützenberger equation Lyndon-Schützenberger equation [Lyndon & Schützenberger 1962] For u, v, w Σ and non-negative tegers l, n, m 0, an equation the form u l = v n w m is called the Lyndon-Schützenberger equation. Solution [Lyndon & Schützenberger 1962, Lothaire 1983, Harju & Nowotka 2004] For l, n, m 2, the equation u l = v n w m implies u, v, w t + for some word t.
39 An extended Lyndon Schützenberger equation Let us extend the LS-equation as: u 1 u l = v 1 v n w 1 w m, where u 1,..., u l {u, θ(u)}, v 1,..., v n {v, θ(v)}, and w 1,..., w m {w, θ(w)}. Problem Fd conditions on l, n, m under which the exls equation (l, n, m) possesses the weak defect, i.e., implies u, v, w {t, θ(t)} + for some word t.
40 exls equations without the weak defect In [Czeizler, Czeizler, Kari, & Seki 2009], we provided examples to verify the followg. Proposition ([Czeizler, Czeizler, Kari, & Seki 2009]) If one l, n, m is 2, then exls equations (l, n, m) does NOT possess the weak defect. As a result, all l, n, m must be at least 3 for exls equations (l, n, m) to possess the weak defect.
41 exls equations with weak defect I Proposition ([Czeizler, Czeizler, Kari, & Seki 2009]) s ( 6, 3, 3) possess the weak defect. u 1 u 2 u 3 u i u l v 1 v 2 v 3 v n w 1 w m Symmetry enables us to assume that v 1 v n w 1 w m. Sce l 6, this means v 1 v n 1 2 u 1 u l u 1 u 2 u 3. Thus, u 1 u l and v 1 v n share a prefix length at least max(3 u, 3 v ) 2 max( u, v ) + m( u, v ).
42 exls equations with weak defect II Pro The common prefix between u 1 u l and v 1 v n is long enough to apply to obta u, v {t, θ(t)} for some θ-primitive word t. Hence, w 1 w m {t, θ(t)}. Usg the lcm-variant, we can conclude w {t, θ(t)}. The same pro technique works for exls equations (5, 5, 5) or (5, 4, 7). Proposition ([Czeizler, Czeizler, Kari, & Seki 2009]) s (5, 5, 5) and (5, 4, 7) possess the weak defect.
43 with l = 4, 5 The followg stronger statement requires results combatorics on. Theorem ([Czeizler, Czeizler, Kari, & Seki 2009]) s ( 5, 3, 3) possess the weak defect. More useful results combatorics on have been obtaed [Kari, Masson, & Seki 2009] to address some cases left open [Czeizler, Czeizler, Kari, & Seki 2009]. Theorem [Kari, Masson, & Seki 2009] s ( 4, 3, 3) possess the weak defect.
44 Summary on the exls equation l n m weak defect how to prove YES YES [Czeizler, Czeizler, Kari, & Seki YES combatorial arguments YES [Czeizler, Czeizler, Kari, & Seki YES combatorial arguments [Kari, Masson, & Seki 2009] OPEN? 2 NO examples 2 NO [Czeizler, Czeizler, Kari, & Seki 2 NO
45 Open problems I Open problems about the 1 Fd an optimal bound for (p, q) for which b (p, q) is not optimal. 2 Extend the problem settg further as: how long prefix do a θ-power u 1, that u 2,..., that u n have to share to imply that u 1, u 2,..., u n t{t, θ(t)} for some word t?
46 Open problems II Open problems about the exls equation 1 Solve exls equations u 1 u 2 u 3 = v 1 v n w 1 w m with n, m 3. 2 Fd a condition under which exls equations with l = 2 are solved positively. 3 Extend the exls equation further as u 1 u l = v 11 v 1n1 v 21 v 2n2 v k1 v knk, where k 2, l, n 1,..., n k 1, u 1,..., u l {u, θ(t)}, and v i1,..., v i {v i, θ(v i )}.
47 Open problems III Other open problems 1 ExFW theorem and positive answers to exls equations are part weak defect theorem. Investigate and establish the weak defect theorem.
48 Information my publication I The followg is a list my publications related to the topics troduced this talk. The list all my publications is available on my website: 1 E. Czeizler, E. Czeizler, L. Kari, and. An extension the Lyndon Schützenberger result to pseudoperiodic. In Proc. DLT 2009, LN 5583, Sprger (2009) E. Czeizler, L. Kari, and. On a special class primitive. Theoretical Computer Science 411(3) (2010)
49 Information my publication II 3 L. Kari, B. Masson, and. Properties pseudo-primitive and their applications. Submitted. 4 L. Kari and. An improved bound for an extension Fe and Wilf theorem. Fundamenta Informaticae 101(3) (2010)
50 I [Chfrut & Karhumäki 1997] C. Chfrut and J. Karhumäki. Combatorics. In G. Rozenberg and A. Salomaa (eds.), Handbook Formal Languages, vol.1, pp Sprger-Verlag, [Constantescu & Ilie 2005] S. Constantescu and L. Ilie. Generalized Fe and Wilf s theorem for arbitrary number periods. Theoretical Computer Science 339(1) (2005)
51 II [Czeizler, Czeizler, Kari, & Seki 2009] E. Czeizler, E. Czeizler, L. Kari, and. An extension the Lyndon Schützenberger result to pseudoperiodic. In Proc. DLT 2009, LN 5583, Sprger (2009) [Czeizler, Kari, & Seki 2010] E. Czeizler, L. Kari, and S. Seki. On a special class primitive. Theoretical Computer Science 411(3) (2010) [Fe & Wilf 1965] N. J. Fe and H. S. Wilf. Uniqueness theorem for periodic functions. Proc. American Mathematical Society 16 (1965)
52 III [Harju & Nowotka 2004] T. Harju and D. Nowotka. The equation x i = y j z k a free semigroup. Semigroup Forum 68 (2004) [Kari, Masson, & Seki 2009] L. Kari, B. Masson, and S. Seki. Properties pseudo-primitive and their applications. Submitted. [Kari & Seki 2010] L. Kari and. An improved bound for an extension Fe and Wilf theorem. Fundamenta Informaticae 101(3) (2010)
53 IV [Lothaire 1983] M. Lothaire. Combatorics on Words. Encyclopedia Mathematics and its Applications, 17, Addison-Wesley Publishg Co., [Lyndon & Schützenberger 1962] R. C. Lyndon and M. P. Schützenberger. The equation a M = b N c P a free group. Michigan Mathematical Journal, 9: , [Sager & Stefanovic 2006] J. Sager and D. Stefanovic. Designg nucleotide sequences for computation: A survey constrats. In Proc. DNA 11, LN 3892, Sprger, 2006.
54 Thank you for your kd attention.
RELATIVE WATSON-CRICK PRIMITIVITY OF WORDS
For submission to the Journal of Automata, Languages and Combinatorics Created on December 1, 2017 RELATIVE WATSON-CRICK PRIMITIVITY OF WORDS Lila Kari (A) Manasi S. Kulkarni (B) Kalpana Mahalingam (B)
More informationTheoretical Computer Science
Theoretical Computer Science 411 (2010) 617 630 Contents lists available at ScienceDirect Theoretical Computer Science journal homepage: www.elsevier.com/locate/tcs On a special class of primitive words
More informationarxiv: v1 [cs.dm] 16 Jan 2018
Embedding a θ-invariant code into a complete one Jean Néraud, Carla Selmi Laboratoire d Informatique, de Traitemement de l Information et des Systèmes (LITIS), Université de Rouen Normandie, UFR Sciences
More informationInvolution Palindrome DNA Languages
Involution Palindrome DNA Languages Chen-Ming Fan 1, Jen-Tse Wang 2 and C. C. Huang 3,4 1 Department of Information Management, National Chin-Yi University of Technology, Taichung, Taiwan 411. fan@ncut.edu.tw
More informationGenerating DNA Code Words Using Forbidding and Enforcing Systems
Generating DNA Code Words Using Forbidding and Enforcing Systems Daniela Genova 1 and Kalpana Mahalingam 2 1 Department of Mathematics and Statistics University of North Florida Jacksonville, FL 32224,
More informationOn the Equation x k = z k 1 in a Free Semigroup
On the Equation x k = z k 1 in a Free Semigroup Tero Harju Dirk Nowotka Turku Centre for Computer Science, TUCS, Department of Mathematics, University of Turku 1 zk 2 2 zk n n TUCS Turku Centre for Computer
More informationFactors of words under an involution
Journal o Mathematics and Inormatics Vol 1, 013-14, 5-59 ISSN: 349-063 (P), 349-0640 (online) Published on 8 May 014 wwwresearchmathsciorg Journal o Factors o words under an involution C Annal Deva Priya
More informationTwin-roots of words and their properties
Twin-roots of words and their properties Lila Kari a, Kalpana Mahalingam a, and Shinnosuke Seki a, a Department of Computer Science, University of Western Ontario, London, Ontario, Canada, N6A 5B7 Tel:
More informationInternational Journal of Scientific & Engineering Research Volume 8, Issue 8, August-2017 ISSN
1280 A Note on Involution Pseudoknot-bordered Words Cheng-Chih Huang 1, Abstract This paper continues the exploration of properties concerning involution pseudoknot- (un)bordered words for a morphic involution
More informationTheoretical Computer Science
Theoretical Computer Science 410 (2009) 2393 2400 Contents lists available at ScienceDirect Theoretical Computer Science journal homepage: www.elsevier.com/locate/tcs Twin-roots of words and their properties
More informationINSTITUT FÜR INFORMATIK
INSTITUT FÜR INFORMATIK Generalised Lyndon-Schützenberger Equations Florin Manea, Mike Müller, Dirk Nowotka, Shinnosuke Seki Bericht Nr. 1403 March 20, 2014 ISSN 2192-6247 CHRISTIAN-ALBRECHTS-UNIVERSITÄT
More informationThe commutation with ternary sets of words
The commutation with ternary sets of words Juhani Karhumäki Michel Latteux Ion Petre Turku Centre for Computer Science TUCS Technical Reports No 589, March 2004 The commutation with ternary sets of words
More informationCoding Properties of DNA Languages
Coding Properties of DNA Languages Salah Hussini 1, Lila Kari 2, and Stavros Konstantinidis 1 1 Department of Mathematics and Computing Science, Saint Mary s University, Halifax, Nova Scotia, B3H 3C3,
More informationWatson-Crick bordered words and their syntactic monoid
Watson-Crick bordered words and their syntactic monoid Lila Kari and Kalpana Mahalingam University of Western Ontario, Department of Computer Science, London, ON, Canada N6A 5B7 lila, kalpana@csd.uwo.ca
More informationLanguage Recognition Power of Watson-Crick Automata
01 Third International Conference on Netorking and Computing Language Recognition Poer of Watson-Crick Automata - Multiheads and Sensing - Kunio Aizaa and Masayuki Aoyama Dept. of Mathematics and Computer
More informationDe Bruijn Sequences Revisited
De Bruijn Sequences Revisited Lila Kari Zhi Xu The University of Western Ontario, London, Ontario, Canada N6A 5B7 lila@csd.uwo.ca zxu@google.com Abstract A (non-circular) de Bruijn sequence w of order
More informationInvertible insertion and deletion operations
Invertible insertion and deletion operations Lila Kari Academy of Finland and Department of Mathematics 1 University of Turku 20500 Turku Finland Abstract The paper investigates the way in which the property
More informationAbout Duval Extensions
About Duval Extensions Tero Harju Dirk Nowotka Turku Centre for Computer Science, TUCS Department of Mathematics, University of Turku June 2003 Abstract A word v = wu is a (nontrivial) Duval extension
More information5 3 Sensing Watson-Crick Finite Automata
Benedek Nagy Department of Computer Science, Faculty of Informatics, University of Debrecen, Hungary 1 Introduction DNA computers provide new paradigms of computing (Păun et al., 1998). They appeared at
More informationPrimitive partial words
Discrete Applied Mathematics 148 (2005) 195 213 www.elsevier.com/locate/dam Primitive partial words F. Blanchet-Sadri 1 Department of Mathematical Sciences, University of North Carolina, P.O. Box 26170,
More informationEquations on Partial Words
Equations on Partial Words F. Blanchet-Sadri 1 D. Dakota Blair 2 Rebeca V. Lewis 3 October 2, 2007 Abstract It is well known that some of the most basic properties of words, like the commutativity (xy
More information5 3 Watson-Crick Automata with Several Runs
5 3 Watson-Crick Automata with Several Runs Peter Leupold Department of Mathematics, Faculty of Science Kyoto Sangyo University, Japan Joint work with Benedek Nagy (Debrecen) Presentation at NCMA 2009
More informationIterated Hairpin Completions of Non-crossing Words
Iterated Hairpin Completions of Non-crossing Words Lila Kari 1, Steffen Kopecki 1,2, and Shinnosuke Seki 3 1 Department of Computer Science University of Western Ontario, London lila@csd.uwo.ca 2 Institute
More informationThe Equation a M = b N c P in a Free Semigroup
The Equation a M = b N c P in a Free Semigroup Tero Harju Dirk Nowotka Turku Centre for Computer Science, TUCS, Department of Mathematics, University of Turku TUCS Turku Centre for Computer Science TUCS
More informationPeriodicity in Rectangular Arrays
Periodicity in Rectangular Arrays arxiv:1602.06915v2 [cs.dm] 1 Jul 2016 Guilhem Gamard LIRMM CNRS, Univ. Montpellier UMR 5506, CC 477 161 rue Ada 34095 Montpellier Cedex 5 France guilhem.gamard@lirmm.fr
More informationLINEAR COMPARTMENTAL MODELS: INPUT-OUTPUT EQUATIONS AND OPERATIONS THAT PRESERVE IDENTIFIABILITY. 1. Introduction
LINEAR COMPARTMENTAL MODELS: INPUT-OUTPUT EQUATIONS AND OPERATIONS THAT PRESERVE IDENTIFIABILITY ELIZABETH GROSS, HEATHER HARRINGTON, NICOLETTE MESHKAT, AND ANNE SHIU Abstract. This work focuses on the
More informationBordered Conjugates of Words over Large Alphabets
Bordered Conjugates of Words over Large Alphabets Tero Harju University of Turku harju@utu.fi Dirk Nowotka Universität Stuttgart nowotka@fmi.uni-stuttgart.de Submitted: Oct 23, 2008; Accepted: Nov 14,
More informationUnbordered Factors and Lyndon Words
Unbordered Factors and Lyndon Words J.-P. Duval Univ. of Rouen France T. Harju Univ. of Turku Finland September 2006 D. Nowotka Univ. of Stuttgart Germany Abstract A primitive word w is a Lyndon word if
More informationRegularity of Iterative Hairpin Completions of Crossing (2, 2)-Words
International Journal of Foundations of Computer Science Vol. 27, No. 3 (2016) 375 389 c World Scientific Publishing Company DOI: 10.1142/S0129054116400153 Regularity of Iterative Hairpin Completions of
More informationLanguages and monoids with disjunctive identity
Languages and monoids with disjunctive identity Lila Kari and Gabriel Thierrin Department of Mathematics, University of Western Ontario London, Ontario, N6A 5B7 Canada Abstract We show that the syntactic
More informationOn Shyr-Yu Theorem 1
On Shyr-Yu Theorem 1 Pál DÖMÖSI Faculty of Informatics, Debrecen University Debrecen, Egyetem tér 1., H-4032, Hungary e-mail: domosi@inf.unideb.hu and Géza HORVÁTH Institute of Informatics, Debrecen University
More informationSubwords in reverse-complement order - Extended abstract
Subwords in reverse-complement order - Extended abstract Péter L. Erdős A. Rényi Institute of Mathematics Hungarian Academy of Sciences, Budapest, P.O. Box 127, H-164 Hungary elp@renyi.hu Péter Ligeti
More informationComplexity of Reachability, Mortality and Freeness Problems for Matrix Semigroups
Complexity of Reachability, Mortality and Freeness Problems for Matrix Semigroups Paul C. Bell Department of Computer Science Loughborough University P.Bell@lboro.ac.uk Co-authors for todays topics: V.
More informationAperiodic languages and generalizations
Aperiodic languages and generalizations Lila Kari and Gabriel Thierrin Department of Mathematics University of Western Ontario London, Ontario, N6A 5B7 Canada June 18, 2010 Abstract For every integer k
More informationResults on Transforming NFA into DFCA
Fundamenta Informaticae XX (2005) 1 11 1 IOS Press Results on Transforming NFA into DFCA Cezar CÂMPEANU Department of Computer Science and Information Technology, University of Prince Edward Island, Charlottetown,
More informationRestricted ambiguity of erasing morphisms
Loughborough University Institutional Repository Restricted ambiguity of erasing morphisms This item was submitted to Loughborough University's Institutional Repository by the/an author. Citation: REIDENBACH,
More informationDeciding Whether a Regular Language is Generated by a Splicing System
Deciding Whether a Regular Language is Generated by a Splicing System Lila Kari Steffen Kopecki Department of Computer Science The University of Western Ontario Middlesex College, London ON N6A 5B7 Canada
More informationTheory of Computation 1 Sets and Regular Expressions
Theory of Computation 1 Sets and Regular Expressions Frank Stephan Department of Computer Science Department of Mathematics National University of Singapore fstephan@comp.nus.edu.sg Theory of Computation
More informationA Fine and Wilf s theorem for pseudoperiods and Justin s formula for generalized pseudostandard words
A Fine and Wilf s theorem for pseudoperiods and Justin s formula for generalized pseudostandard words A. Blondin Massé 1,2, G. Paquin 2 and L. Vuillon 2 1 Laboratoire de Combinatoire et d Informatique
More informationInsertion and Deletion of Words: Determinism and Reversibility
Insertion and Deletion of Words: Determinism and Reversibility Lila Kari Academy of Finland and Department of Mathematics University of Turku 20500 Turku Finland Abstract. The paper addresses two problems
More informationDENSITY OF CRITICAL FACTORIZATIONS
DENSITY OF CRITICAL FACTORIZATIONS TERO HARJU AND DIRK NOWOTKA Abstract. We investigate the density of critical factorizations of infinte sequences of words. The density of critical factorizations of a
More informationTransducer Descriptions of DNA Code Properties and Undecidability of Antimorphic Problems
Transducer Descriptions of DNA Code Properties and Undecidability of Antimorphic Problems Lila Kari 1, Stavros Konstantinidis 2, and Steffen Kopecki 1,2 1 The University of Western Ontario, London, Ontario,
More informationRunning head: Watson-Crick Quantum Finite Automata. Title: Watson-Crick Quantum Finite Automata. Authors: Kingshuk Chatterjee 1, Kumar Sankar Ray 2
Running head: Watson-Crick Quantum Finite Automata Title: Watson-Crick Quantum Finite Automata Authors: Kingshuk Chatterjee 1, Kumar Sankar Ray Affiliations: 1, Electronics and Communication Sciences Unit,
More informationConjugacy on partial words. By: Francine Blanchet-Sadri and D.K. Luhmann
Conjugacy on partial words By: Francine Blanchet-Sadri and D.K. Luhmann F. Blanchet-Sadri and D.K. Luhmann, "Conjugacy on Partial Words." Theoretical Computer Science, Vol. 289, No. 1, 2002, pp 297-312.
More informationUniversal Algebra for Logics
Universal Algebra for Logics Joanna GRYGIEL University of Czestochowa Poland j.grygiel@ajd.czest.pl 2005 These notes form Lecture Notes of a short course which I will give at 1st School on Universal Logic
More informationOn the robustness of primitive words
Discrete Applied Mathematics 117 (2002) 239 252 On the robustness of primitive words Gheorghe Paun a, Nicolae Santean b, Gabriel Thierrin b;, Sheng Yu b a Institute of Mathematics of the Romanian Academy,
More informationFine and Wilf s Periodicity on Partial Words and Consequences
Fine and Wilf s Periodicity on Partial Words and Consequences F. Blanchet-Sadri 1, Kevin Corcoran 2, and Jenell Nyberg 3 1 Department of Computer Science, University of North Carolina, P.O. Box 26170,
More informationSubstitutions, Trajectories and Noisy Channels
Substitutions, Trajectories and Noisy Channels Lila Kari 1, Stavros Konstantinidis 2, and Petr Sosík 1,3, 1 Department of Computer Science, The University of Western Ontario, London, ON, Canada, N6A 5B7
More informationSome Operations Preserving Primitivity of Words
Some Operations Preserving Primitivity of Words Jürgen Dassow Fakultät für Informatik, Otto-von-Guericke-Universität Magdeburg PSF 4120; D-39016 Magdeburg; Germany Gema M. Martín, Francisco J. Vico Departamento
More informationFinding Pseudo-repetitions
Finding Pseudo-repetitions Paweł Gawrychowski 1, Florin Manea 2, Robert Mercaş 3, Dirk Nowotka 2, and Cătălin Tiseanu 4 1 Max-Planck-Institut für Informatik, Saarbrücken, Germany, gawry@cs.uni.wroc.pl
More informationA Formal Language Model of DNA Polymerase Enzymatic Activity
Fundamenta Informaticae 138 (2015) 179 192 179 DOI 10.3233/FI-2015-1205 IOS Press A Formal Language Model of DNA Polymerase Enzymatic Activity Srujan Kumar Enaganti, Lila Kari, Steffen Kopecki Department
More informationOn P Systems with Active Membranes
On P Systems with Active Membranes Andrei Păun Department of Computer Science, University of Western Ontario London, Ontario, Canada N6A 5B7 E-mail: apaun@csd.uwo.ca Abstract. The paper deals with the
More informationDNA Codes and Their Properties
DNA Codes and Their Properties Lila Kari and Kalpana Mahalingam University of Western Ontario, Department of Computer Science, London, ON N6A5B7 {lila, kalpana}@csd.uwo.ca Abstract. One of the main research
More informationDeciding Whether a Regular Language is Generated by a Splicing System
Deciding Whether a Regular Language is Generated by a Splicing System Lila Kari Steffen Kopecki Department of Computer Science The University of Western Ontario London ON N6A 5B7 Canada {lila,steffen}@csd.uwo.ca
More informationThe number of runs in Sturmian words
The number of runs in Sturmian words Paweł Baturo 1, Marcin Piatkowski 1, and Wojciech Rytter 2,1 1 Department of Mathematics and Computer Science, Copernicus University 2 Institute of Informatics, Warsaw
More informationSYNTACTIC SEMIGROUP PROBLEM FOR THE SEMIGROUP REDUCTS OF AFFINE NEAR-SEMIRINGS OVER BRANDT SEMIGROUPS
SYNTACTIC SEMIGROUP PROBLEM FOR THE SEMIGROUP REDUCTS OF AFFINE NEAR-SEMIRINGS OVER BRANDT SEMIGROUPS JITENDER KUMAR AND K. V. KRISHNA Abstract. The syntactic semigroup problem is to decide whether a given
More informationInsertion operations: closure properties
Insertion operations: closure properties Lila Kari Academy of Finland and Mathematics Department 1 Turku University 20 500 Turku, Finland 1 Introduction The basic notions used for specifying languages
More informationProperties of Fibonacci languages
Discrete Mathematics 224 (2000) 215 223 www.elsevier.com/locate/disc Properties of Fibonacci languages S.S Yu a;, Yu-Kuang Zhao b a Department of Applied Mathematics, National Chung-Hsing University, Taichung,
More informationSolving Subset Sum Problems by Time-free Spiking Neural P Systems
Appl. Math. Inf. Sci. 8, No. 1, 327-332 (2014) 327 Applied Mathematics & Information Sciences An International Journal http://dx.doi.org/10.12785/amis/080140 Solving Subset Sum Problems by Time-free Spiking
More informationElectronics and Communication Sciences Unit, Indian Statistical Institute, Kolkata-108
Running head: Reversible Watson-Crick Automata Title: Reversible Watson-Crick Automata Authors: Kingshuk Chatterjee 1, Kumar Sankar Ray(corresponding author) 2 Affiliations: 1,2 Electronics and Communication
More informationResearch Statement. MUHAMMAD INAM 1 of 5
MUHAMMAD INAM 1 of 5 Research Statement Preliminaries My primary research interests are in geometric inverse semigroup theory and its connections with other fields of mathematics. A semigroup M is called
More informationOn closures of lexicographic star-free languages. E. Ochmański and K. Stawikowska
On closures of lexicographic star-free languages E. Ochmański and K. Stawikowska Preprint No 7/2005 Version 1, posted on April 19, 2005 On closures of lexicographic star-free languages Edward Ochma ski
More informationDuplication in DNA Sequences
Duplication in DNA Sequences Masami Ito 1, Lila Kari 2, Zachary Kincaid 2, and Shinnosuke Seki 2 1 Department of Mathematics, Faculty of Science, Kyoto Sangyo University, Kyoto, Japan, 603-8555 ito@ksuvx0.kyoto-su.ac.jp
More informationState Complexity of Neighbourhoods and Approximate Pattern Matching
State Complexity of Neighbourhoods and Approximate Pattern Matching Timothy Ng, David Rappaport, and Kai Salomaa School of Computing, Queen s University, Kingston, Ontario K7L 3N6, Canada {ng, daver, ksalomaa}@cs.queensu.ca
More informationAddress: Electronics and Communication Sciences Unit, Indian Statistical Institute, Kolkata-108.
Running head: Multi-head Watson-Crick automata Title: Multi-head Watson-Crick automata Authors: Kingshuk Chatterjee 1, Kumar Sankar Ray(corresponding author) Affiliations: 1 Electronics and Communication
More informationOptimal Superprimitivity Testing for Strings
Optimal Superprimitivity Testing for Strings Alberto Apostolico Martin Farach Costas S. Iliopoulos Fibonacci Report 90.7 August 1990 - Revised: March 1991 Abstract A string w covers another string z if
More informationReconstruction from subwords
6 th International Conference on Applied Informatics Eger, Hungary, January 27 31, 2004. Reconstruction from subwords Péter Ligetia, Péter Sziklaib a Department of Computer Science, Eötvös Loránd University
More informationOn the coinductive nature of centralizers
On the coinductive nature of centralizers Charles Grellois INRIA & University of Bologna Séminaire du LIFO Jan 16, 2017 Charles Grellois (INRIA & Bologna) On the coinductive nature of centralizers Jan
More informationOn the dual post correspondence problem
Loughborough University Institutional Repository On the dual post correspondence problem This item was submitted to Loughborough University's Institutional Repository by the/an author. Citation: DAY, J.D.,
More informationDESCRIPTIONAL COMPLEXITY OF NFA OF DIFFERENT AMBIGUITY
International Journal of Foundations of Computer Science Vol. 16, No. 5 (2005) 975 984 c World Scientific Publishing Company DESCRIPTIONAL COMPLEXITY OF NFA OF DIFFERENT AMBIGUITY HING LEUNG Department
More informationDecision Problems Concerning. Prime Words and Languages of the
Decision Problems Concerning Prime Words and Languages of the PCP Marjo Lipponen Turku Centre for Computer Science TUCS Technical Report No 27 June 1996 ISBN 951-650-783-2 ISSN 1239-1891 Abstract This
More informationNote Watson Crick D0L systems with regular triggers
Theoretical Computer Science 259 (2001) 689 698 www.elsevier.com/locate/tcs Note Watson Crick D0L systems with regular triggers Juha Honkala a; ;1, Arto Salomaa b a Department of Mathematics, University
More informationarxiv:math/ v1 [math.co] 11 Oct 2002
COUNTING THE OCCURRENCES OF GENERALIZED PATTERNS IN WORDS GENERATED BY A MORPHISM arxiv:math/0210170v1 [math.co] 11 Oct 2002 Sergey Kitaev and Toufik Mansour 1 Matematik, Chalmers tekniska högskola och
More informationInner Product Spaces
Inner Product Spaces Introduction Recall in the lecture on vector spaces that geometric vectors (i.e. vectors in two and three-dimensional Cartesian space have the properties of addition, subtraction,
More informationA PASCAL-LIKE BOUND FOR THE NUMBER OF NECKLACES WITH FIXED DENSITY
A PASCAL-LIKE BOUND FOR THE NUMBER OF NECKLACES WITH FIXED DENSITY I. HECKENBERGER AND J. SAWADA Abstract. A bound resembling Pascal s identity is presented for binary necklaces with fixed density using
More informationA Characterisation of NL/poly via Nondeterministic Finite Automata.
A Characterisation of NL/poly via Nondeterministic Finite Automata. Rob Myers and Henning Urbat Institut für Theoretische Informatik TU Braunschweig, Germany April 3, 23 Abstract For each language L 2
More informationWatson-Crick ω-automata. Elena Petre. Turku Centre for Computer Science. TUCS Technical Reports
Watson-Crick ω-automata Elena Petre Turku Centre for Computer Science TUCS Technical Reports No 475, December 2002 Watson-Crick ω-automata Elena Petre Department of Mathematics, University of Turku and
More informationON HIGHLY PALINDROMIC WORDS
ON HIGHLY PALINDROMIC WORDS Abstract. We study some properties of palindromic (scattered) subwords of binary words. In view of the classical problem on subwords, we show that the set of palindromic subwords
More informationFuzzy Answer Set semantics for Residuated Logic programs
semantics for Logic Nicolás Madrid & Universidad de Málaga September 23, 2009 Aims of this paper We are studying the introduction of two kinds of negations into residuated : Default negation: This negation
More informationFINE AND WILF WORDS FOR ANY PERIODS II. R. Tijdeman and L.Q. Zamboni
FINE AND WILF WORDS FOR ANY PERIODS II R. Tijdeman and L.Q. Zamboni Abstract. Given positive integers n, and p 1,..., p r, we define a fast word combinatorial algorithm for constructing a word w = w 1
More informationFINE AND WILF WORDS FOR ANY PERIODS II. R. Tijdeman and L. Zamboni
FINE AND WILF WORDS FOR ANY PERIODS II R. Tijdeman and L. Zamboni Abstract. In 2003 the authors introduced a fast algorithm to determine the word w = w 1...w n of maximal length n, and with a maximal number
More informationSome decision problems on integer matrices
Some decision problems on integer matrices Christian Choffrut L.I.A.F.A, Université Paris VII, Tour 55-56, 1 er étage, 2 pl. Jussieu 75 251 Paris Cedex France Christian.Choffrut@liafa.jussieu.fr Juhani
More informationarxiv: v1 [math.co] 9 Jun 2015
On Maximal Chains of Systems of Word Equations Juhani Karhumäki and Aleksi Saarela Department of Mathematics and Statistics University of Turku, 20014 Turku, Finland arxiv:1506.02913v1 [math.co] 9 Jun
More informationOn Rice s theorem. Hans Hüttel. October 2001
On Rice s theorem Hans Hüttel October 2001 We have seen that there exist languages that are Turing-acceptable but not Turing-decidable. An important example of such a language was the language of the Halting
More informationThe Computational Power of Extended Watson-Crick L Systems
The Computational Power of Extended Watson-Crick L Systems by David Sears A thesis submitted to the School of Computing in conformity with the requirements for the degree of Master of Science Queen s University
More informationPartial Words and the Critical Factorization Theorem Revisited
Partial Words and the Critical Factorization Theorem Revisited F. Blanchet-Sadri and Nathan D. Wetzler Department of Mathematical Sciences University of North Carolina P.O. Box 26170 Greensboro, NC 27402
More informationWeakly unambiguous morphisms
Loughborough University Institutional Repository Weakly unambiguous morphisms This item was submitted to Loughborough University's Institutional Repository by the/an author. Citation: FREYDENBERGER, D.D.,
More informationSupplementary Examples for
Supplementary Examples for Infinite Interval Exchange Transformations from Shifts ([LN15]) Luis-Miguel Lopez Philippe Narbel Version 1.0, April, 2016 Contents A The Shifted Intervals Preservation (Lemma
More informationCourse on Inverse Problems
Stanford University School of Earth Sciences Course on Inverse Problems Albert Tarantola Third Lesson: Probability (Elementary Notions) Let u and v be two Cartesian parameters (then, volumetric probabilities
More informationOn Chomsky Hierarchy of Palindromic Languages
Acta Cybernetica 22 (2016) 703 713. On Chomsky Hierarchy of Palindromic Languages Pál Dömösi, Szilárd Fazekas, and Masami Ito Abstract The characterization of the structure of palindromic regular and palindromic
More informationState Complexity of Two Combined Operations: Catenation-Union and Catenation-Intersection
International Journal of Foundations of Computer Science c World Scientific Publishing Company State Complexity of Two Combined Operations: Catenation-Union and Catenation-Intersection Bo Cui, Yuan Gao,
More informationCombinatorial Interpretations of a Generalization of the Genocchi Numbers
1 2 3 47 6 23 11 Journal of Integer Sequences, Vol. 7 (2004), Article 04.3.6 Combinatorial Interpretations of a Generalization of the Genocchi Numbers Michael Domaratzki Jodrey School of Computer Science
More informationPower of controlled insertion and deletion
Power of controlled insertion and deletion Lila Kari Academy of Finland and Department of Mathematics 1 University of Turku 20500 Turku Finland Abstract The paper investigates classes of languages obtained
More informationPERIODS OF FACTORS OF THE FIBONACCI WORD
PERIODS OF FACTORS OF THE FIBONACCI WORD KALLE SAARI Abstract. We show that if w is a factor of the infinite Fibonacci word, then the least period of w is a Fibonacci number. 1. Introduction The Fibonacci
More informationLecture notes 1: ECEN 489
Lecture notes : ECEN 489 Power Management Circuits and Systems Department of Electrical & Computer Engeerg Texas A&M University Jose Silva-Martez January 207 Copyright Texas A&M University. All rights
More informationDNA computing, sticker systems, and universality
Acta Informatica 35, 401 420 1998 c Springer-erlag 1998 DNA computing, sticker systems, and universality Lila Kari 1, Gheorghe Păun 2, Grzegorz Rozenberg 3, Arto Salomaa 4, Sheng Yu 1 1 Department of Computer
More informationSplitting sets and weakly Matlis domains
Commutative Algebra and Applications, 1 8 de Gruyter 2009 Splitting sets and weakly Matlis domains D. D. Anderson and Muhammad Zafrullah Abstract. An integral domain D is weakly Matlis if the intersection
More informationDeletion operations: closure properties
Deletion operations: closure properties Lila Kari Academy of Finland and Department of Mathematics 1 University of Turku 20500 Turku Finland June 3, 2010 KEY WORDS: right/left quotient, sequential deletion,
More informationNumber of occurrences of powers in strings
Author manuscript, published in "International Journal of Foundations of Computer Science 21, 4 (2010) 535--547" DOI : 10.1142/S0129054110007416 Number of occurrences of powers in strings Maxime Crochemore
More information