SlideShare a Scribd company logo
Presentation By:
Name: Shamim Ahammad Rasel
ID: 1805033
Session: 2018
Begum Rokeya University, Rangpur
Department of Computer Science & Engineering
Faculty of Engineering & Technology
Presented To:
Prodip Kumar Sarkar,
Associate Professor,
Department of Computer Science & Engineering
Begum Rokeya University, Rangpur
Course Title: Theory of Computation and Automata
Topic
Two Way Finite Automata
Introduction
Two-way finite automata is similar to finite automata, except that it can read the input in either
direction left-to-right or right-or-left.
The 2FA machines have a read head that can move in any direction from the current position to
either left or right according to state transition function.
Classification
Formal Definition of Two way DFA
A two way deterministic finite automaton can be defined by 8-tuple.
M = (Q, ∑, ꜔, ˧, R, δ, s, t, r) where,
Q : Finite set of non empty states
∑ : Finite non empty set of input symbols
꜔: ꜔is left endmarker
˧ : ˧ is right endmarker
δ : Q X ( ∑ ⋃ {L, R}) ➙ Q X {left, right}
s : s 𝝐 Q is the start state
t : t 𝝐 Q is the accept state
r : r 𝝐 Q is the reject state, where r ≠ t
An Example of 2DFA
Consider a 2DFA M that behaves as follows starting in state q₀, M repeats a cycle of moves wherein the
tape head moves right until two ones have been countered then left until encountering a zero at which
point state q₀ is re-entered and the cycle repeated. More precisely M has three states all of which are
final state, δ is given as follows:
0 1
q₀ (q₀, R) (q₁, R)
q₁ (q₁, R) (q₂, L)
q₂ (q₀, R) (q₂, L)
An Example of 2DFA
Here, we can define 8 tuple as
Q = {q₀, q₁, q₂}
∑ = {0 , 1}
꜔, ˧ are left endmarker and right endmarker respectively
s = q₀
t = q₁
r = q₂
And state transition defined as given table
An Example of 2DFA
Input string is 101001
꜔ 1 0 1 0 0 1 ˧
꜔ 1 0 1 0 0 1 ˧
q₀
q₁
An Example of 2DFA
꜔ 1 0 1 0 0 1 ˧
꜔ 1 0 1 0 0 1 ˧
꜔ 1 0 1 0 0 1 ˧
q₁
q₂
q₀
An Example of 2DFA
꜔ 1 0 1 0 0 1 ˧
꜔ 1 0 1 0 0 1 ˧
꜔ 1 0 1 0 0 1 ˧
q₁
q1
q1
An Example of 2DFA
꜔ 1 0 1 0 0 1 ˧
꜔ 1 0 1 0 0 1 ˧
꜔ 1 0 1 0 0 1 ˧
q₀
q₂
꜔ 1 0 1 0 0 1 ˧
q₀
q₁
State Diagram
Conclusion
As we can notice the two way finite automata can read input in either right or left side so the automaton
is not same as 1DFA and automaton is like Turing machine but in read only manner so we can say that
The Two way finite automata works like read only Turing Machine.
Sources
Internet,
Google,
Youtube,
Book
Othera
Automata 2FA presentation Slide.pptx

More Related Content

Similar to Automata 2FA presentation Slide.pptx

Impedance meter
Impedance meterImpedance meter
Impedance meter
MohammedNurMobaratAb
 
FM CHAPTER 5.pptx
FM CHAPTER 5.pptxFM CHAPTER 5.pptx
FM CHAPTER 5.pptx
kesava2004010
 
Theta join (M-bucket-I algorithm explained)
Theta join (M-bucket-I algorithm explained)Theta join (M-bucket-I algorithm explained)
Theta join (M-bucket-I algorithm explained)
Minsub Yim
 
BEC- 26 control systems_unit-II
BEC- 26 control systems_unit-IIBEC- 26 control systems_unit-II
BEC- 26 control systems_unit-II
Shadab Siddiqui
 
Unit iv
Unit ivUnit iv
Unit iv
TPLatchoumi
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Editor IJARCET
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Editor IJARCET
 
APLICACIONES DE ESPACIO VECTORIALES
APLICACIONES DE ESPACIO VECTORIALESAPLICACIONES DE ESPACIO VECTORIALES
APLICACIONES DE ESPACIO VECTORIALES
JoseLuisCastroGualot
 
@vtucode.in-module-1-21CS51-5th-semester (1).pdf
@vtucode.in-module-1-21CS51-5th-semester (1).pdf@vtucode.in-module-1-21CS51-5th-semester (1).pdf
@vtucode.in-module-1-21CS51-5th-semester (1).pdf
FariyaTasneem1
 
17 16512 32451-1-sm (edit ari)
17 16512 32451-1-sm (edit ari)17 16512 32451-1-sm (edit ari)
17 16512 32451-1-sm (edit ari)
IAESIJEECS
 
17 16512 32451-1-sm (edit ari)
17 16512 32451-1-sm (edit ari)17 16512 32451-1-sm (edit ari)
17 16512 32451-1-sm (edit ari)
IAESIJEECS
 
Theory of computation and automata
Theory of computation and automataTheory of computation and automata
Theory of computation and automata
Prof. Dr. K. Adisesha
 
Theory of computation and automata
Theory of computation and automataTheory of computation and automata
Theory of computation and automata
Prof. Dr. K. Adisesha
 
HMM-Based Speech Synthesis
HMM-Based Speech SynthesisHMM-Based Speech Synthesis
HMM-Based Speech Synthesis
IJMER
 
Meeting w3 chapter 2 part 1
Meeting w3   chapter 2 part 1Meeting w3   chapter 2 part 1
Meeting w3 chapter 2 part 1mkazree
 
Meeting w3 chapter 2 part 1
Meeting w3   chapter 2 part 1Meeting w3   chapter 2 part 1
Meeting w3 chapter 2 part 1Hattori Sidek
 
Automata theory introduction
Automata theory introductionAutomata theory introduction
Automata theory introduction
NAMRATA BORKAR
 
Direct QR factorizations for tall-and-skinny matrices in MapReduce architectu...
Direct QR factorizations for tall-and-skinny matrices in MapReduce architectu...Direct QR factorizations for tall-and-skinny matrices in MapReduce architectu...
Direct QR factorizations for tall-and-skinny matrices in MapReduce architectu...
Austin Benson
 
A New Approach on Proportional Fuzzy Likelihood Ratio orderings of Triangular...
A New Approach on Proportional Fuzzy Likelihood Ratio orderings of Triangular...A New Approach on Proportional Fuzzy Likelihood Ratio orderings of Triangular...
A New Approach on Proportional Fuzzy Likelihood Ratio orderings of Triangular...
IJRESJOURNAL
 
Channel and clipping level estimation for ofdm in io t –based networks a review
Channel and clipping level estimation for ofdm in io t –based networks a reviewChannel and clipping level estimation for ofdm in io t –based networks a review
Channel and clipping level estimation for ofdm in io t –based networks a review
IJARIIT
 

Similar to Automata 2FA presentation Slide.pptx (20)

Impedance meter
Impedance meterImpedance meter
Impedance meter
 
FM CHAPTER 5.pptx
FM CHAPTER 5.pptxFM CHAPTER 5.pptx
FM CHAPTER 5.pptx
 
Theta join (M-bucket-I algorithm explained)
Theta join (M-bucket-I algorithm explained)Theta join (M-bucket-I algorithm explained)
Theta join (M-bucket-I algorithm explained)
 
BEC- 26 control systems_unit-II
BEC- 26 control systems_unit-IIBEC- 26 control systems_unit-II
BEC- 26 control systems_unit-II
 
Unit iv
Unit ivUnit iv
Unit iv
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207
 
APLICACIONES DE ESPACIO VECTORIALES
APLICACIONES DE ESPACIO VECTORIALESAPLICACIONES DE ESPACIO VECTORIALES
APLICACIONES DE ESPACIO VECTORIALES
 
@vtucode.in-module-1-21CS51-5th-semester (1).pdf
@vtucode.in-module-1-21CS51-5th-semester (1).pdf@vtucode.in-module-1-21CS51-5th-semester (1).pdf
@vtucode.in-module-1-21CS51-5th-semester (1).pdf
 
17 16512 32451-1-sm (edit ari)
17 16512 32451-1-sm (edit ari)17 16512 32451-1-sm (edit ari)
17 16512 32451-1-sm (edit ari)
 
17 16512 32451-1-sm (edit ari)
17 16512 32451-1-sm (edit ari)17 16512 32451-1-sm (edit ari)
17 16512 32451-1-sm (edit ari)
 
Theory of computation and automata
Theory of computation and automataTheory of computation and automata
Theory of computation and automata
 
Theory of computation and automata
Theory of computation and automataTheory of computation and automata
Theory of computation and automata
 
HMM-Based Speech Synthesis
HMM-Based Speech SynthesisHMM-Based Speech Synthesis
HMM-Based Speech Synthesis
 
Meeting w3 chapter 2 part 1
Meeting w3   chapter 2 part 1Meeting w3   chapter 2 part 1
Meeting w3 chapter 2 part 1
 
Meeting w3 chapter 2 part 1
Meeting w3   chapter 2 part 1Meeting w3   chapter 2 part 1
Meeting w3 chapter 2 part 1
 
Automata theory introduction
Automata theory introductionAutomata theory introduction
Automata theory introduction
 
Direct QR factorizations for tall-and-skinny matrices in MapReduce architectu...
Direct QR factorizations for tall-and-skinny matrices in MapReduce architectu...Direct QR factorizations for tall-and-skinny matrices in MapReduce architectu...
Direct QR factorizations for tall-and-skinny matrices in MapReduce architectu...
 
A New Approach on Proportional Fuzzy Likelihood Ratio orderings of Triangular...
A New Approach on Proportional Fuzzy Likelihood Ratio orderings of Triangular...A New Approach on Proportional Fuzzy Likelihood Ratio orderings of Triangular...
A New Approach on Proportional Fuzzy Likelihood Ratio orderings of Triangular...
 
Channel and clipping level estimation for ofdm in io t –based networks a review
Channel and clipping level estimation for ofdm in io t –based networks a reviewChannel and clipping level estimation for ofdm in io t –based networks a review
Channel and clipping level estimation for ofdm in io t –based networks a review
 

Recently uploaded

A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 

Recently uploaded (20)

A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 

Automata 2FA presentation Slide.pptx

  • 1. Presentation By: Name: Shamim Ahammad Rasel ID: 1805033 Session: 2018 Begum Rokeya University, Rangpur Department of Computer Science & Engineering Faculty of Engineering & Technology Presented To: Prodip Kumar Sarkar, Associate Professor, Department of Computer Science & Engineering Begum Rokeya University, Rangpur Course Title: Theory of Computation and Automata
  • 3. Introduction Two-way finite automata is similar to finite automata, except that it can read the input in either direction left-to-right or right-or-left. The 2FA machines have a read head that can move in any direction from the current position to either left or right according to state transition function.
  • 5. Formal Definition of Two way DFA A two way deterministic finite automaton can be defined by 8-tuple. M = (Q, ∑, ꜔, ˧, R, δ, s, t, r) where, Q : Finite set of non empty states ∑ : Finite non empty set of input symbols ꜔: ꜔is left endmarker ˧ : ˧ is right endmarker δ : Q X ( ∑ ⋃ {L, R}) ➙ Q X {left, right} s : s 𝝐 Q is the start state t : t 𝝐 Q is the accept state r : r 𝝐 Q is the reject state, where r ≠ t
  • 6. An Example of 2DFA Consider a 2DFA M that behaves as follows starting in state q₀, M repeats a cycle of moves wherein the tape head moves right until two ones have been countered then left until encountering a zero at which point state q₀ is re-entered and the cycle repeated. More precisely M has three states all of which are final state, δ is given as follows: 0 1 q₀ (q₀, R) (q₁, R) q₁ (q₁, R) (q₂, L) q₂ (q₀, R) (q₂, L)
  • 7. An Example of 2DFA Here, we can define 8 tuple as Q = {q₀, q₁, q₂} ∑ = {0 , 1} ꜔, ˧ are left endmarker and right endmarker respectively s = q₀ t = q₁ r = q₂ And state transition defined as given table
  • 8. An Example of 2DFA Input string is 101001 ꜔ 1 0 1 0 0 1 ˧ ꜔ 1 0 1 0 0 1 ˧ q₀ q₁
  • 9. An Example of 2DFA ꜔ 1 0 1 0 0 1 ˧ ꜔ 1 0 1 0 0 1 ˧ ꜔ 1 0 1 0 0 1 ˧ q₁ q₂ q₀
  • 10. An Example of 2DFA ꜔ 1 0 1 0 0 1 ˧ ꜔ 1 0 1 0 0 1 ˧ ꜔ 1 0 1 0 0 1 ˧ q₁ q1 q1
  • 11. An Example of 2DFA ꜔ 1 0 1 0 0 1 ˧ ꜔ 1 0 1 0 0 1 ˧ ꜔ 1 0 1 0 0 1 ˧ q₀ q₂ ꜔ 1 0 1 0 0 1 ˧ q₀ q₁
  • 13. Conclusion As we can notice the two way finite automata can read input in either right or left side so the automaton is not same as 1DFA and automaton is like Turing machine but in read only manner so we can say that The Two way finite automata works like read only Turing Machine.