This lecture slide contains:
1. Regular Languages
2. Regular Operations
3. Closure of regular languages
4. Regular expression
5. Precedence of regular operations
6. RE for different languages
7. RE to NFA conversion
8. DFA to GNFA to RE conversion
This is the lecture slide contains:
- CFG definition
- Designing CFG from DFA
- Designing CFG from RE
- Designing CFG for linked terminals typed languages
- Union of CFGs
This lecture covers:
1. Regular Language and Regular Operations
2. Closure properties of DFAs
3. Union of 2 DFA machines
4. Intersection of 2 DFA machines
5. Complement of DFA machines
This is the lecture slide contains:
- CFG definition
- Designing CFG from DFA
- Designing CFG from RE
- Designing CFG for linked terminals typed languages
- Union of CFGs
This lecture covers:
1. Regular Language and Regular Operations
2. Closure properties of DFAs
3. Union of 2 DFA machines
4. Intersection of 2 DFA machines
5. Complement of DFA machines
This presentation contains:
1. Language, Regular Language
2. DFA vs. NFA
3. Components of DFA
4. Acceptability checking
5. Group-wise designing different types of DFA machines
This presentation contains:
1. Introduction
2. Central areas of TOC
3. Complexity theory
4. Computability theory
5. Automata theory
6. Related terminologies
7. Strings
8. Languages
9. Proof, Theorem, Lemma, Corollaries
This Lecture Note discusses the followings:
- What is NFA
- DFA vs NFA
- How does NFA compute
- Designing different NFA machines
- Regular operations on NFAs
- Conversion from NFA to DFA
Matrix Transformations on Paranormed Sequence Spaces Related To De La Vallée-...inventionjournals
In this paper, we determine the necessary and sufficient conditions to characterize the matrices which transform paranormed sequence spaces into the spaces 푉휎 (휆) and 푉휎 ∞(휆) , where 푉휎 (휆) denotes the space of all (휎, 휆)-convergent sequences and 푉휎 ∞(휆) denotes the space of all (휎, 휆)-bounded sequences defined using the concept of de la Vallée-Pousin mean.
This presentation contains:
1. Language, Regular Language
2. DFA vs. NFA
3. Components of DFA
4. Acceptability checking
5. Group-wise designing different types of DFA machines
This presentation contains:
1. Introduction
2. Central areas of TOC
3. Complexity theory
4. Computability theory
5. Automata theory
6. Related terminologies
7. Strings
8. Languages
9. Proof, Theorem, Lemma, Corollaries
This Lecture Note discusses the followings:
- What is NFA
- DFA vs NFA
- How does NFA compute
- Designing different NFA machines
- Regular operations on NFAs
- Conversion from NFA to DFA
Matrix Transformations on Paranormed Sequence Spaces Related To De La Vallée-...inventionjournals
In this paper, we determine the necessary and sufficient conditions to characterize the matrices which transform paranormed sequence spaces into the spaces 푉휎 (휆) and 푉휎 ∞(휆) , where 푉휎 (휆) denotes the space of all (휎, 휆)-convergent sequences and 푉휎 ∞(휆) denotes the space of all (휎, 휆)-bounded sequences defined using the concept of de la Vallée-Pousin mean.
Multisets are very powerful and yet simple control mechanisms in regulated rewriting systems. In this paper, we review back the main results on the generative power of multiset controlled grammars introduced in recent research. It was proven that multiset controlled grammars are at least as powerful as additive valence grammars and at most as powerful as matrix grammars. In this paper, we mainly investigate the closure properties of multiset controlled grammars. We show that the family of languages generated by multiset controlled grammars is closed under operations union, concatenation, kleene-star, homomorphism and mirror image.
Dual Spaces of Generalized Cesaro Sequence Space and Related Matrix Mappinginventionjournals
In this paper we define the generalized Cesaro sequence spaces 푐푒푠(푝, 푞, 푠). We prove the space 푐푒푠(푝, 푞, 푠) is a complete paranorm space. In section-2 we determine its Kothe-Toeplitz dual. In section-3 we establish necessary and sufficient conditions for a matrix A to map 푐푒푠 푝, 푞, 푠 to 푙∞ and 푐푒푠(푝, 푞, 푠) to c, where 푙∞ is the space of all bounded sequences and c is the space of all convergent sequences. We also get some known and unknown results as remarks.
This slide contains,
1) Some terminologies like yields, derives, word, derivation
2) Leftmost and Rightmost derivation
3) Ambiguity checking
4) Parse tree generation and ambiguity checking
A Fifth-Order Iterative Method for Solving Nonlinear Equationsinventionjournals
International Journal of Mathematics and Statistics Invention (IJMSI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJMSI publishes research articles and reviews within the whole field Mathematics and Statistics, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online
Matrix Transformations on Some Difference Sequence SpacesIOSR Journals
The sequence spaces 𝑙∞(𝑢,𝑣,Δ), 𝑐0(𝑢,𝑣,Δ) and 𝑐(𝑢,𝑣,Δ) were recently introduced. The matrix classes (𝑐 𝑢,𝑣,Δ :𝑐) and (𝑐 𝑢,𝑣,Δ :𝑙∞) were characterized. The object of this paper is to further determine the necessary and sufficient conditions on an infinite matrix to characterize the matrix classes (𝑐 𝑢,𝑣,Δ ∶𝑏𝑠) and (𝑐 𝑢,𝑣,Δ ∶ 𝑙𝑝). It is observed that the later characterizations are additions to the existing ones
Fuzzy random variables and Kolomogrov’s important resultsinventionjournals
:In this paper an attempt is made to transform Kolomogrov Maximal inequality, Koronecker Lemma, Loeve’s Lemma and Kolomogrov’s strong law of large numbers for independent, identically distributive fuzzy Random variables. The applications of this results is extensive and could produce intensive insights on Fuzzy Random variables
Machine Translation (MT) refers to the use of computers for the task of translating
automatically from one language to another. The differences between languages and
especially the inherent ambiguity of language make MT a very difficult problem. Traditional
approaches to MT have relied on humans supplying linguistic knowledge in the form of rules
to transform text in one language to another. Given the vastness of language, this is a highly
knowledge intensive task. Statistical MT is a radically different approach that automatically
acquires knowledge from large amounts of training data. This knowledge, which is typically
in the form of probabilities of various language features, is used to guide the translation
process. This report provides an overview of MT techniques, and looks in detail at the basic
statistical model.
This slide explains the conversion procedure from ER Diagram to Relational Schema.
1. Entity set to Relation
2. Relationship set to Relation
3. Attributes to Columns, Primary key, Foreign Keys
1. What is Entity Relationship Model
2. Entity and Entity Set
3. Relationship and Relationship Set
4. Attributes and it's kinds
5. Participation Constraints and Mapping Cardinality
6. Aggregation, Specialization, and Generalization
7. Some Sample ERD models
This note includes the followings:
- Database Create, Drop Operations
- Database Table Create, Drop Operations
- Database Table Alter Operation
- Data insertion
- Data deletion
- Existing data update
- Searching data from data table (showing all record, specific columns, specific rows, column aliasing, sorting data, limiting data, distinct data)
- Aggregate functions
- Group by clause
- Having clause
- Types of table joins
- Table aliasing, Inner Join, Left/Right Join, Self Join
- Subquery operation (scalar subquery, column subquery, row subquery, correlated subquery, derived table)
This note contains some sample MySQL query practices based on the HR Schema database. The practice sections are from the following categories:
- DDL statements
- Basic Select statements
- Aggregate operations
- Join operations
This lecture slide contains:
- Difference between FA, PDA and TM
- Formal definition of TM
- TM transition function and configuration
- Designing TM for different languages
- Simulating TM for different strings
Contents:
1. Direct Address Table
2. Hashing
3. Characteristics of a good hash function
4. Collision Resolution using Chaining and Probing
5. Static vs Dynamic Hashing
6. Extendible Hashing
7. B+ tree vs Hashing
This lecture includes:
1. JavaScript DOM basics
2. Document object (frequently used properties and methods)
3. Element Object (frequently used properties and methods)
4. Node Object (frequently used properties and methods)
5. Location Object (frequently used properties and methods)
6. Window object (frequently used properties and methods)
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
2. Regular Languages
Regular Language:
– A language is called a regular language if some finite automaton(DFA) recognizes it.
– A language is regular if and only if some nondeterministic finite automaton(NFA) recognizes it.
– If a language is described by a regular expression(RE), then it is also regular.
2
NFA
DFA
RE
Mohammad Imam Hossain | Lecturer, Dept. of CSE | UIU
3. Regular Operations
▸ 3 operations are defined on languages called Regular Operations.
▸ Here, the name Regular Operations is just a name that has been chosen for these 3 operations.
▸ Regular Operations are used to study properties of the Regular Languages.
Definition:
Let Σ be an alphabet and A,B ⊆ Σ* be languages. Then the regular operations are as follows:
Union: The language A⋃B ⊆ Σ* is defined as, A⋃B = { w | w ∈ A or w ∈ B }
Concatenation: The language AB ⊆ Σ* is defined as, AB = { wx | w ∈ A and x ∈ B }
Kleene star/ Star: The language A* is defined as, A* = { x1x2 … … xk | k≥0 and each xi ∈ A }
3
Mohammad Imam Hossain | Lecturer, Dept. of CSE | UIU
4. Regular Operations - Example
Let,
Alphabet Σ = { a, b, c, … … … , z }
Language A = { good, bad } ⊆ Σ*
Language B = { boy, girl } ⊆ Σ*
Then,
A⋃B = { good, bad, boy, girl }
AB = { goodboy, goodgirl, badboy, badgirl }
A* = { 𝜀, good, bad, goodgood, goodbad, badgood, badbad, goodgoodgood, goodgoodbad, … … }
4
Mohammad Imam Hossain | Lecturer, Dept. of CSE | UIU
5. Regular Languages – Closure Property
▸ The regular languages are closed with respect to the regular operations:
if A, B ⊆ Σ* are regular languages, then the languages A⋃B, AB, and A* are also regular.
▸ There are many other operations on languages aside from the regular operations under which the
regular languages are also closed.
Subtraction:
The language AB ⊆ Σ* is defined as, AB = { w | w ∈ A and w ∉ B } = A⋂ഥB
Complement:
The language ഥA ⊆ Σ* is defined as, ഥA = { w | w ∈ Σ* and w ∉ A } = Σ*A
Intersection:
The language A⋂B ⊆ ∑* is defined as, A⋂B = { w | w ∈ A and w ∈ B } = ҧ𝐴 ∪ ത𝐵
Reverse:
The language AR ⊆ Σ* is defined as, AR = { wk wk-1 … … w2 w1 | w=w1w2 … … wk ∈ A }
5
Mohammad Imam Hossain | Lecturer, Dept. of CSE | UIU
6. Regular Expressions
Arithmetic Expressions:
▸ We use the operations + and x to build up expressions such as (5+3)x4
▸ The value of arithmetic expression is the number 32.
Regular Expression:
▸ We use regular operations to build up expressions describing languages called Regular Expressions.
▸ The value of regular expression is a language.
▸ For example, (0⋃1)0*
Note:
REs have an important role in computer science applications. It provides powerful methods to describe
different string patterns in UNIX commands, modern programming languages, text editors etc.
6
Mohammad Imam Hossain | Lecturer, Dept. of CSE | UIU
7. Regular Expressions – Definition
Regular Expression:
R is a regular expression if R is
▸ a for some a in the alphabet Σ,
▸ 𝜀,
▸ 𝜙,
▸ (R1 ⋃ R2), where R1 and R2 are regular expressions,
▸ (R1 o R2), where R1 and R2 are regular expressions, or
▸ (𝑅1
∗
), where R1 is a regular expression.
7
Mohammad Imam Hossain | Lecturer, Dept. of CSE | UIU
8. Regular Expressions – Precedence Order
8
Precedence of Regular Operations:
1. Parentheses
2. Star
3. Concatenation
4. Union
So according to the precedence sequence: (ab U a)* = ( ( (a) (b) ) U ( a ) ) *
Mohammad Imam Hossain | Lecturer, Dept. of CSE | UIU
9. RE – Practices
9
Language, L(R) Regular Expression
{ w | w contains a single 1 } 0* 1 0*
{ w | w consists of exactly three 1’s } 0* 1 0* 1 0* 1 0*
{ w | w has at least a single 1 } (0 | 1)* 1 (0 | 1)*
{ w | w contains at least three 1’s } (0 | 1)* 1 (0 | 1)* 1 (0 | 1)* 1 (0 | 1)*
{ w | w has at most one 1 } 0* | 0* 1 0*
{ w | w contains an even number of 1’s } (0* 1 0* 1 0*)* 0*
{ w | the number of 1’s withing w can be evenly divided by 3 } (0* 1 0* 1 0* 1 0* )* 0*
{ w | w is a string of even length } (ΣΣ)*, here Σ = (0 | 1)
{ w | the length of w is a multiple of 3 } (ΣΣΣ)*, here Σ = (0 | 1)
Mohammad Imam Hossain | Lecturer, Dept. of CSE | UIU
10. RE – Practices
10
Language, L(R) Regular Expression
{ w | w starts with 101 } 101 (0 | 1)*
{ w | w contains the string 001 as a substring } (0 | 1)* 001 (0 | 1)*
{ w | w ends with 3 consecutive 1’s } (0 | 1)* 111
{ w | w doesn’t end with 11 } 𝜀 | 0 | 1 | (0 | 1)* (00 | 01 | 10)
{ w | w ends with an even nonzero number of 0’s } ( (0 | 1)* 1 | 𝜀 ) 00 (00)*
{ w | w starts and ends with the same symbol } 0 | 1 | 0Σ*0 | 1Σ*1, here Σ = (0 | 1)
{ w | w has at least 3 characters and the 3rd character is 0 } (0 | 1) (0 | 1) 0 (0 | 1)*
{ w | every zero in w is followed by at least one 1 } 1* (01+)*
{ w | w consists of alternating zeros and ones } (1 | 𝜀) (01)* (0 | 𝜀)
Mohammad Imam Hossain | Lecturer, Dept. of CSE | UIU
11. RE – Practices
11
Language, L(R) Regular Expression
{ 01, 10 } 01 | 10
01* | 1* (0 | 𝜀) 1*
{ 𝜀, 0, 1, 01 } (0 | 𝜀) (1 | 𝜀)
𝜙 R𝜙
{ 𝜀 } 𝜙*
{ w | w starts with 0 and has odd length or, starts with
1 and has even length }
0 ( (0 | 1) (0 | 1) )* | 1 (0 | 1) ( (0 | 1) (0 | 1) )*
Mohammad Imam Hossain | Lecturer, Dept. of CSE | UIU
12. RE NFA
▸ R = a for some a ∈ Σ. Then L(R) = { a }, and the following NFA recognizes L(R)
▸ R = 𝜀 . Then L(R) = { 𝜀 } and the following NFA recognizes L(R)
▸ R = 𝜙 . Then L(R) = 𝜙, and the following NFA recognizes L(R)
▸ R = R1 U R2 , so L(R) = L(R1) U L(R2) = NFA1 recognizes L(R1) U NFA2 recognizes L(R2)
▸ R = R1 o R2 = R1R2 = = L(R1) o L(R2) = NFA1 recognizes L(R1) o NFA2 recognizes L(R2)
▸ R = R1
* = L(R1)* = ( NFA1 recognizes L(R1) )*
12
Mohammad Imam Hossain | Lecturer, Dept. of CSE | UIU
13. RE NFA : Example 1
Convert the following RE to equivalent NFA:
(ab U a)*
13
Mohammad Imam Hossain | Lecturer, Dept. of CSE | UIU
14. RE NFA : Practices
14
▸ ( a U b ) * a b a
▸ ( 0 U 1 ) * 0 0 0 ( 0 U 1 )* = Σ* 0 0 0 Σ* where Σ = 0, 1 = 0 U 1
▸ ( ( ( 0 0 )* ( 1 1 ) ) U 0 1 ) *
▸ ( 0 1 U 0 0 1 U 0 1 0 ) *
▸ a ( a b b ) * U b
▸ a+ U ( a b ) +
▸ ( a U b+ ) a+ b+ [ Hint: replace a+ with (a a*) ]
▸ 1* ( 0 1+)*
▸ ( Σ Σ Σ ) *
▸ 0 Σ* 0 U 1 Σ* 1 U 0 U 1
▸ 𝜙*
▸ ( 0 U 𝜀 ) 1*
Mohammad Imam Hossain | Lecturer, Dept. of CSE | UIU
15. DFA GNFA RE
15
Mohammad Imam Hossain | Lecturer, Dept. of CSE | UIU
Steps to follow:
16. GNFA
▸ A GNFA is a nondeterministic finite automaton(NFA) in which each
transition is labeled with a regular expression over the alphabet set
instead of only members of the alphabet or 𝜀.
▸ A single initial state with all possible outgoing transitions and no
incoming transitions.
▸ A single final state without outgoing transitions but all possible
incoming transitions. The accept state is not the same as the start
state.
▸ A single transition between every two states, including self loops.
16
Mohammad Imam Hossain | Lecturer, Dept. of CSE | UIU
17. GNFA – Formal Definition
A generalized nondeterministic finite automaton is a 5 tuple,
(Q, Σ, 𝛿, qstart, qaccept ), where
▸ Q is the finite set of states
▸ Σ is the input alphabet
▸ 𝛿: ( Q - {qaccept} ) x ( Q - {qstart} ) ℛ is the transition function
[if you travel from state a 𝜖 ( Q - {qaccept} ) to state b 𝜖 ( Q - {qstart} ) then
this relation will generate ℛ regular expression ]
▸ qstart is the start state and
▸ qaccept is the accept state
17
Mohammad Imam Hossain | Lecturer, Dept. of CSE | UIU
18. GNFA – State Minimization Rule
18
Removing qrip state,
Mohammad Imam Hossain | Lecturer, Dept. of CSE | UIU
19. DFA GNFA : Steps to Follow
19
▸ Add a new start state with an 𝜀 arrow to the old start state
▸ Add a new accept state with 𝜀 arrows from the old accept states to this new accept state
▸ If any arrows have multiple labels, replace each with a single arrow whose label is the union of the
previous labels
▸ Add arrows labeled 𝜙 between states that had no arrows. [better no to show this in the diagram, for
simplicity]
Mohammad Imam Hossain | Lecturer, Dept. of CSE | UIU
20. CONVERT(G):
1. Let k be the number of states of G.
2. If k=2, then G must consist of a start state, an accept state, and a single arrow connecting them and
labeled with a regular expression R
— Return the expression R.
3. If k>2, we select any state qrip ∈ Q different from qstart and qaccept and let G’ be the GNFA (Q’, Σ, 𝛿’, qstart,
qaccept), where
Q’ = Q - {qrip}
and for any qi ∈ Q’–{qaccept} and any qj ∈ Q’–{qstart}, let
𝛿’(qi, qj) = (R1) (R2)*(R3) U (R4)
for R1 = 𝛿(qi, qrip), R2 = 𝛿(qrip, qrip), R3 = 𝛿(qrip, qj), and R4 = 𝛿(qi, qj)
4. Compute CONVERT(G’) and return this value.
GNFA RE : Algorithm
20
Mohammad Imam Hossain | Lecturer, Dept. of CSE | UIU
21. GNFA RE : Removing State 2
21
Here, 2 is associated with states 1 and a. All possible combinations are (1,1), (1,a), (a,a), (a,1). But there
will be no outgoing from a, so no need to consider (a,a) and (a,1) states.
For (1,1), R = a U (b (aUb)* 𝜙)) = a
Mohammad Imam Hossain | Lecturer, Dept. of CSE | UIU
22. GNFA RE : Removing State 2
22
Here, 2 is associated with states 1 and a. All possible combinations are (1,1), (1,a), (a,a), (a,1). But there
will be no outgoing from a, so no need to consider (a,a) and (a,1) states.
For (1,a), R = 𝜙 U (b (aUb)* 𝜀) = b(aUb)*
Mohammad Imam Hossain | Lecturer, Dept. of CSE | UIU
23. GNFA RE : Removing State 1
23
Mohammad Imam Hossain | Lecturer, Dept. of CSE | UIU
24. DFA GNFA RE : Example 2
24
Mohammad Imam Hossain | Lecturer, Dept. of CSE | UIU
25. DFA GNFA RE : Practices
25
Mohammad Imam Hossain | Lecturer, Dept. of CSE | UIU
Practice 1 Practice 2
26. 26
THANKS!
Any questions?
You can find me at imam@cse.uiu.ac.bd
References:
Chapter 1(section 1.3), Introduction to the Theory of Computation, 3rd Edition by Michael Sipser