In computer science, Turing machine (TM) defines computation.Since the NuMachine (NM) is equivalent to the Turing Machine, we can explain the concepts of programming in terms of NM. The advantage is that the programming will be based on the Peano axioms which forms the foundations of mathematics. A special matrix multiplication of NuAlgebra (NA) replaces the unintuitive movements of the TM.
SYSTEM IDENTIFICATION USING CEREBELLAR MODEL ARITHMETIC COMPUTERTarun Kumar
The field of identification is rather complex. This complexity is due to the variety of applications, goals, conditions, etc. Exact
specifications of final aim to be attained, analysis of available precision, etc. are some of the basic requirements to guide the work. In
this paper we used CMAC look up table for identification of both linear and non-linear systems. It deals with the basic CMAC
architectures, its capability and shows the motivations why CMAC net can be used for system identification. CMAC network has
hundreds of thousands of adjustable weights that can be trained to approximate non-linearities which are not explicitly written out or
even known. Its associative memory has a built in generalization. We have shown that due to its extremely fast mapping and training
operations, it is suitable for real time applications.
Tensor representations in signal processing and machine learning (tutorial ta...Tatsuya Yokota
Tutorial talk in APSIPA-ASC 2020.
Title: Tensor representations in signal processing and machine learning.
Introduction to tensor decomposition (テンソル分解入門)
Basics of tensor decomposition (テンソル分解の基礎)
This paper proposes modeling and identification of dynamical systems in delta
domain using neural network. The properties of delta operator are used such as greater
numerical robustness in computation and superior coefficients representation in finite word
length in implementation and well ensured numerical conditioning at high sampling
frequency. To formulate the identification scheme delta operator model is recasted into a
realizable neural network structure using the properties of inverse delta operator.
SYSTEM IDENTIFICATION USING CEREBELLAR MODEL ARITHMETIC COMPUTERTarun Kumar
The field of identification is rather complex. This complexity is due to the variety of applications, goals, conditions, etc. Exact
specifications of final aim to be attained, analysis of available precision, etc. are some of the basic requirements to guide the work. In
this paper we used CMAC look up table for identification of both linear and non-linear systems. It deals with the basic CMAC
architectures, its capability and shows the motivations why CMAC net can be used for system identification. CMAC network has
hundreds of thousands of adjustable weights that can be trained to approximate non-linearities which are not explicitly written out or
even known. Its associative memory has a built in generalization. We have shown that due to its extremely fast mapping and training
operations, it is suitable for real time applications.
Tensor representations in signal processing and machine learning (tutorial ta...Tatsuya Yokota
Tutorial talk in APSIPA-ASC 2020.
Title: Tensor representations in signal processing and machine learning.
Introduction to tensor decomposition (テンソル分解入門)
Basics of tensor decomposition (テンソル分解の基礎)
This paper proposes modeling and identification of dynamical systems in delta
domain using neural network. The properties of delta operator are used such as greater
numerical robustness in computation and superior coefficients representation in finite word
length in implementation and well ensured numerical conditioning at high sampling
frequency. To formulate the identification scheme delta operator model is recasted into a
realizable neural network structure using the properties of inverse delta operator.
Multiplication of two 3 d sparse matrices using 1d arrays and linked listsDr Sandeep Kumar Poonia
A basic algorithm of 3D sparse matrix multiplication (BASMM) is presented using one dimensional (1D) arrays which is used further for multiplying two 3D sparse matrices using Linked Lists. In this algorithm, a general concept is derived in which we enter non- zeros elements in 1st and 2nd sparse matrices (3D) but store that values in 1D arrays and linked lists so that zeros could be removed or ignored to store in memory. The positions of that non-zero value are also stored in memory like row and column position. In this way space complexity is decreased. There are two ways to store the sparse matrix in memory. First is row major order and another is column major order. But, in this algorithm, row major order is used. Now multiplying those two matrices with the help of BASMM algorithm, time complexity also decreased. For the implementation of this, simple c programming and concepts of data structures are used which are very easy to understand for everyone.
Merge sort is a sorting technique based on divide and conquer technique. With worst-case time complexity being Ο(n log n), it is one of the most respected algorithms.
Merge sort first divides the array into equal halves and then combines them in a sorted manner.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
In theoretical computer science and mathematics , the theory of computation is the branch that
deals with how efficiently problems can be solved on a model of computation, using an algorithm. The field is
divided into three major branches: automata theory, computability theory, and computational complexity
theory.
In order to perform a rigorous study of computation, computer scientists work with a mathematical
abstraction of computers called a model of computation. There are several models in use such as Lambda
calculus, Combinatory logic, mu-recursive functions , but the most commonly examined is the Turing machine.
Computer scientists study the Turing machine because it is simple to formulate, can be analyzed and used to
prove results, and because it represents what many consider the most powerful possible "reasonable" model of
computation . It might seem that the potentially infinite memory capacity is an unrealizable attribute, but
any decidable problem solved by a Turing machine will always require only a finite amount of memory. So in
principle, any problem that can be solved (decided) by a Turing machine can be solved by a computer that has a
bounded amount of memory.
Detecting Assignable Signals Via Decomposition Of Newma Statisticjournal ijrtem
Abstract: The MEWMAChart is used in Process monitoring when a quick detection of small or moderate shifts in the mean vector is desired. When there are shifts in a multivariateControlCharts, it is clearly shows that special cause variation is present in the Process, but the major drawback of MEWMA is inability to identify which variable(s) is/are the source of the signals. Hence effort must be made to identify which variable(s) is/are responsible for the out- of-Control situation. In this article, we employ Mason, Young and Tracy (MYT) approach in identifying the variables for the signals. Keywords: Quality Control, Multivariate StatisticalProcessControl, MEWMA Statistic
Implementation of Stopwatch using QCA based Carry Select AdderIJTET Journal
As transistor size reduces and more of them can be accommodated in a single die, thus rising chip computational capabilities. However, transistors cannot get smaller than their current size. The quantum-dot cellular automata (QCA) approach represents one of the possible solutions in overcoming this physical limit. The design of adders on quantum-dot cellular automata has been of recent interest. This paper presents an efficient QCA design for the Carry Select Adder (CSA). The QCA based CSA has better performance in terms of area and delay than the existing RCA. The application of this QCA based Carry Select Adder in stopwatch also designed.
Deep learning is a technique that basically mimics the human brain. So, the Scientist and Researchers taught can we make machines learn in the same way so, there is where the deep learning concept came that led to the invention called the neural network
Multiplication of two 3 d sparse matrices using 1d arrays and linked listsDr Sandeep Kumar Poonia
A basic algorithm of 3D sparse matrix multiplication (BASMM) is presented using one dimensional (1D) arrays which is used further for multiplying two 3D sparse matrices using Linked Lists. In this algorithm, a general concept is derived in which we enter non- zeros elements in 1st and 2nd sparse matrices (3D) but store that values in 1D arrays and linked lists so that zeros could be removed or ignored to store in memory. The positions of that non-zero value are also stored in memory like row and column position. In this way space complexity is decreased. There are two ways to store the sparse matrix in memory. First is row major order and another is column major order. But, in this algorithm, row major order is used. Now multiplying those two matrices with the help of BASMM algorithm, time complexity also decreased. For the implementation of this, simple c programming and concepts of data structures are used which are very easy to understand for everyone.
Merge sort is a sorting technique based on divide and conquer technique. With worst-case time complexity being Ο(n log n), it is one of the most respected algorithms.
Merge sort first divides the array into equal halves and then combines them in a sorted manner.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
In theoretical computer science and mathematics , the theory of computation is the branch that
deals with how efficiently problems can be solved on a model of computation, using an algorithm. The field is
divided into three major branches: automata theory, computability theory, and computational complexity
theory.
In order to perform a rigorous study of computation, computer scientists work with a mathematical
abstraction of computers called a model of computation. There are several models in use such as Lambda
calculus, Combinatory logic, mu-recursive functions , but the most commonly examined is the Turing machine.
Computer scientists study the Turing machine because it is simple to formulate, can be analyzed and used to
prove results, and because it represents what many consider the most powerful possible "reasonable" model of
computation . It might seem that the potentially infinite memory capacity is an unrealizable attribute, but
any decidable problem solved by a Turing machine will always require only a finite amount of memory. So in
principle, any problem that can be solved (decided) by a Turing machine can be solved by a computer that has a
bounded amount of memory.
Detecting Assignable Signals Via Decomposition Of Newma Statisticjournal ijrtem
Abstract: The MEWMAChart is used in Process monitoring when a quick detection of small or moderate shifts in the mean vector is desired. When there are shifts in a multivariateControlCharts, it is clearly shows that special cause variation is present in the Process, but the major drawback of MEWMA is inability to identify which variable(s) is/are the source of the signals. Hence effort must be made to identify which variable(s) is/are responsible for the out- of-Control situation. In this article, we employ Mason, Young and Tracy (MYT) approach in identifying the variables for the signals. Keywords: Quality Control, Multivariate StatisticalProcessControl, MEWMA Statistic
Implementation of Stopwatch using QCA based Carry Select AdderIJTET Journal
As transistor size reduces and more of them can be accommodated in a single die, thus rising chip computational capabilities. However, transistors cannot get smaller than their current size. The quantum-dot cellular automata (QCA) approach represents one of the possible solutions in overcoming this physical limit. The design of adders on quantum-dot cellular automata has been of recent interest. This paper presents an efficient QCA design for the Carry Select Adder (CSA). The QCA based CSA has better performance in terms of area and delay than the existing RCA. The application of this QCA based Carry Select Adder in stopwatch also designed.
Deep learning is a technique that basically mimics the human brain. So, the Scientist and Researchers taught can we make machines learn in the same way so, there is where the deep learning concept came that led to the invention called the neural network
Finite automaton discussed so far, is just associated with the RE or the language.
There is a question whether does there exist an FA which generates an output string corresponding to each input string ? The answer is yes. Such machines are called machines with output.
There are two types of machines with output.
Moore machine
Mealy machine
Equivalent machines Two machines are said to be equivalent if they print the same output string when the same input string is run on them.
Performance Analysis of Input Vector Monitoring Concurrent Built In Self Repa...IJTET Journal
Abstract—Built-in self test (BIST) techniques constitute an attractive and practical solution to the problem of testing VLSI circuits and systems. Input vector monitoring concurrent built-in self test (BIST) schemes perform testing during the normal operation of the circuit without imposing a need to set the circuit offline to perform the test. These schemes are evaluated based on the hardware overhead and the concurrent test latency (CTL). CTL means that the time required for the test to complete, whereas the circuit operates normally. In this brief, we present a novel input vector monitoring concurrent BIST scheme, which is based on the idea of monitoring a set (called window) of vectors reaching the circuit inputs during normal operation, and the use of a static-RAM like structure to store the relative locations of the vectors that reach the circuit inputs in the examined window; the proposed scheme is shown to perform significantly better than previously proposed schemes with respect to the hardware overhead and CTL tradeoff. The proposed method also performs novel BISD and BISR schemes based on the fail pattern identification and also binary matrix lossless compression scheme to compress the test patterns in test cubes.
Power and Log sequences: Shannon's Log n and Ramanujan's Log Log n ver1904Kannan Nambiar
Shannon recognized log n as an appropriate measure of choice when there are n objects to choose from, and developed a whole theory of communication that we use today. Ramanujan in his collected papers states that "almost all numbers n are composed of about log log n prime factors". This presentation explores log log ... log n further.
Mathematical and Spiritual Universes with Millennia old MantrasKannan Nambiar
Since the dawn of civilization, we have attempted to restrict our attention to the palpable world, but we have failed to do so miserably. Anybody with some intellect always ends up with questions about his existence, usually with no solution in sight. This presentation gives some answers provided by our ancestors.
My understanding is that it is our linguistic ability, that distinguishes us from the rest of the living creatures. Scribbling on paper, we have found out that earth goes round the sun in an elliptical orbit and also there has to be electromagnetic waves. Paul Erdos conceives of a book, he calls it The Book, where the Almighty has recorded all the proofs (reasoning) we are capable of in lexical order so that mathematicians can refer to it for the validity of their arguments. I call The Book our intellectual space. The presentation here is about the duality between the intellectual space and the physical space.
It gives me great comfort to visualize this universe as the surface of an ever expanding four-dimensional sphere originating from a distant, but finite, past and growing indefinitely for ever. In this idealized model it easy to calculate the age of the universe by observing the velocity of the receding stars and also to make several other interesting conclusions. For more details, continue reading the presentation.
In ancient cultures the favorite question of sishya to his guru was "Who Am I?" and in the end he learnt everything about Reality. If you want a similar question in mathematics, ask "Is Riemann Hypothesis true?", and you will learn almost everything about mathematics. This presentation gives an elementary introduction to zeta functions using natural functions.
Sentient Arithmetic and Godel's Incompleteness TheoremsKannan Nambiar
For me, there is only one logic that we rational human beings are able to accept and appreciate, and that is the mathematical logic of ZF theory. But in the last century we found that ZF theory is not in a position to provide all that we want, and went in search of a new mode of thinking and got one which we called meta mathematics. My question is: if we can put the unambiguous logic of ZF theory on paper, why can't we do the same with meta mathematics. This paper is my feeble attempt in that direction.
Infinitesimal is defined as an infinite recursive subset of positive integers. The definition visualizes the unit interval as a set of infinitesimals and the unreachable infinite universe as a set of black-wholes.
Explicit Formula for Riemann Prime Counting FunctionKannan Nambiar
Corresponding to every zeta function there is a delta series. We make use of this fact to derive an explicit formula for Riemann Prime Counting Function.
Unconventional View of Godel's Theorems to Accommodate HistoryKannan Nambiar
What happened with respect to Fermat's last theorem and four-color conjecture forces us to change our view on the significance of Godel's incompleteness theorems.
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
1. NuMachine and NuAlgebra
K. K. NAMBIAR
School of Computer and Systems Sciences
Jawaharlal Nehru University, New Delhi 110067, India
(Received June 1995)
Abstract—A NuMachine capable of computing any recursive function is defined as a labeled
graph with certain restrictions. A NuAlgebra that goes with the machine is also discussed with
examples.
Keywords—NuMachine; NuAlgebra; Recursive functions.
1. INTRODUCTION
A directed graph, here called NuMachine (also written as numachine), can be used as a model
of computation if the graph satisfies the properties given below.
1. All edges have one of the three labels a, b, or e. Two different edges can have the same label.
2. All nodes have labels 1, 1 , 1 , . . . , 2, 2 , 2 , . . . , 3, . . . , . . . , 0, the last label being always zero.
No two different nodes can have the same label. Node 1 is called the initial node and node
0 is called the final node.
3. The outdegree of the node 0 is zero. The outdegree of every other node is either one or two.
If it is one, the outgoing edge is labeled as a, and if it is two, the outgoing edges are labelled
as b and e.
4. A set of nodes is designated as input nodes and a single node is designated as the output
node.
The basis for the definition of this graph is the abacus machine described in [1], where it is
shown that abacus machines are equivalent to Turing machines. Since numachine is nothing but a
formalized version of the abacus machine, defined in terms of a graph, it follows that numachines
are also equivalent to Turing Machines and can compute any recursive function.
Figures 1 and 2 are examples of numachines which can perform addition and multiplication
respectively. For the adding machine the input nodes are 1 and 2 and the output node is 2, and
for the multiplying machine the input nodes are 1 and 2 and the output node is 3.
...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
................................
................................................................
• •
•
1 2
0
b
ae
Fig. 1
...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
......................................................................................................................................................................................................................................................................................................................................................................................................... .........................................................................................................................................................................................................................................................................................................................................................................................................
................................
................................
...................................
.................................
...................................
...................................
...................................
............................................................................................................................................
............................................................................................................................
................
e
b e
e
b
a
a b a
•
•
•
•
•
• •
0
1
2 4
3 4
2
Fig. 2
2. 2. NUMACHINE
The working of the machine can be easily understood if we imagine each node as a register
having a string of a’s stored in it. The machine always starts from node 1 and moves from node
to node depending on the outgoing edges of the node. If the outgoing edge has label a, then
the machine increments the length of the string at that node by one and goes along the edge a
to the next node. If the outgoing edges have the labels b and e, then the length of the string is
decremented by one and goes along the edge b to the next node. If the length of the string is
already zero and hence cannot be decremented, the machine simply moves along edge e to the
next node.
When a set of nodes have the same number for a label, ignoring primes, it means that the
strings in those nodes can be incremented or decremented only simultaneously. When the string
in one of the nodes in the set is incremented or decremented, all the other nodes in the set do so
automatically. The working of the multiplication machine in Example 2, given later, illustrates
this. If the machine ever reaches the node 0, then it just stays put there and the computation is
considered to be over.
3. NUALGEBRA
We use the adjacency matrix [2] of the numachine in our calculations in the NuAlgebra
(also written as nualgebra). The adjacency matrix operates on a state vector of the machine and
produces a new state vector, and this process continues until the operation is no longer possible.
The muliplication of matrices in nualgebra is totally different from the usual one in that at every
stage the move to the next state vector is decided by just one row, and that too the row affects
only the corresponding row of the state vector. The position of the nonzero elements in the row
decide which row of the adjacency matrix is to be used next. The multiplication always starts
off with the first row of the matrix. These facts can easily be inferred from the working of the
numachine.
The two examples below illustrates the transitions of the machines in Figures 1 and 2 for
addition and multiplication. We will use the notation [k] for the length of the string in node k.
Example 1:
In this example the numachine calculates 2 + 2 as 4. The initial state vector shows that
[1] = 2 and [2] = 2. The final state vector shows [2] = 4.
1 2 0
1 b e
2 a
0
a2
a2
e
=
a a e
a2
a3
a3
e e e
e
a4
e
Example 2:
Here the machine calculates 2 × 2 as 4. The initial state vector shows that [1] = 2 and
[2] = 2. The final state vector shows [3] = 4.
3.
1 2 2 3 4 4 0
1 b e
2 b e
2 a
3 a
4 a
4 e b
0
a2
a2
a2
e
e
e
e
=
a a a a a a a a a a a e ··
a2
a a a e e e e a a a2
a2
··
a2
a a a e e e e a a a2
a2
··
e e a a a a2
a2
a2
a2
a2
a2
a2
··
e e e a a a a2
a a e e e ··
e e e a a a a2
a a e e e ··
e e e e e e e e e e e e ··
e
a2
a2
a4
e
e
e
4. CONCLUSION
The attempt here has been to show that computation of recursive functions can also be
viewed as matrix multiplication apart from pebble manipulation and string processing.
REFERENCES
1. G. Boolos and R. Jeffrey, Computability and Logic, Cambridge University Press, New York, NY, (1974).
2. N. Deo, Graph Theory with Applications to Engineering and Computer Science, Prentice Hall of India, New
Delhi, (1984).