SlideShare a Scribd company logo
…   ε ε a0 a1       …        an ε ε   …
        RD     Input Tape
        Head




                 Finite
                Control

                  qi
 Create a Turing Machine that takes as input a string
 consists of different parentheses ( ), [ ] or { } and ensure
 if that string is balanced – open parentheses are balanced
 with closed parentheses – and correct – the smaller one
 does not include the bigger –.

 Examples:
 {[[(()())]()]}    Accepted (balanced and correct)
 [(())(){()()}]    Rejected (balanced but wrong)
 {[()}}{[(())]}    Rejected (correct but unbalanced)
 {()([])}[(()]]    Rejected (unbalanced and wrong)
Q = { Start , Find1 , Find2 , Find3 , End , Rejected , Accepted }
States Description :
Start : initial state, that begin to find first symbol ), ] or } then check it with X, Y or Z respectively.

Find1 : moving left to find matched symbol (, then check it with X and return to Start state.

Find2 : moving left to find matched symbol [, then check it with Y and return to Start state.

Find3 : moving left to find matched symbol {, then check it with Z and return to Start state.

End : the string is finished, thus moving left to ensure that all symbols are checked.

Rejected : there are unchecked (unbalanced) symbols or the string is wrong, therefore string is rejected.

Accepted : all symbols are checked (balanced) and the string is correct, therefore string is accepted.
Γ ={(,),[,],{,},X,Y,Z,ε}   (Tape Alphabet)

Σ ={(,),[,],{,}}           (Input Alphabet)

F = { Accepted }           (Finite States)

Initial State: Start


Blank Symbol: ε
δ(q , γ)        (          )           [          ]           {           }      X         Y          Z            ε
 Start        Start       Find1      Start       Find2      Start       Find3   Start    Start      Start        End
→),],}        (,R         X,L        [,R          Y,L       {,R          Z,L    X,R      Y,R        Z,R          ε,L
                                   Rejected               Rejected                      Rejected   Rejected    Rejected
 Find1        Start                                                             Find1
  (           X,R
                            -         [,L          -         {,L          -
                                                                                X,L
                                                                                          Y,L        Z,L         ε ,R
                                    (wrong)                (wrong)                      (wrong)    (wrong)    (unbalanced)

            Rejected                                      Rejected                                 Rejected    Rejected
 Find2                      -
                                     Start                                      Find2    Find2
  [
              (,L
                                     Y,R
                                                   -         {,L          -
                                                                                 X,L      Y,L
                                                                                                     Z,L         ε ,R
           (unbalanced)                                    (wrong)                                 (wrong)    (unbalanced)

            Rejected               Rejected                                                                    Rejected
 Find3                                                      Start               Find3    Find3      Find3
  {
              (,L           -        [,L           -
                                                            Z,R
                                                                          -
                                                                                 X,L      Y,L        Z,L         ε,R
           (unbalanced)           (unbalanced)                                                                (unbalanced)

                                                                                                               Accepted
 End        Rejected               Rejected               Rejected
                                                                                End       End        End         ε,R
              (,L           -        [,L           -        {,L           -
  ε        (unbalanced)           (unbalanced)           (unbalanced)
                                                                                X,L       Y,L        Z,L        (correct)
                                                                                                               (balanced)

Rejected
  Stop          -           -          -           -          -           -       -        -          -            -


Accepted
  Stop          -           -          -           -          -           -       -        -          -            -
X/X,L


                                                         Find
                                                           1
                     Y/Y,L



                                             [/Y,R
           ε/ε,R
                                                         Find
  Accept             End     ε/ε,L   Start                        (/(,L {/{,L Z/Z,L ε/ε,L   Reject
                                                           2
                                             ]/Y,L
                                                          Y/Y,L



                                                         Find
                                                           3
X/Y,D
X : Scanned Symbol
Y : Written Symbol                               [/[,L
D : Move Direction
A. The string: {[()]}


              …   ε     {   [   (   )   ]   }   ε   …




                                Start
A. The string: {[()]}


              …   ε     {   [   (   )   ]   }   ε   …




                                Start
A. The string: {[()]}


              …   ε     {   [   (   )   ]   }   ε   …




                                Start
A. The string: {[()]}


              …   ε     {   [   (   )   ]   }   ε   …




                                Start
A. The string: {[()]}


              …   ε     {   [   ( X     ]   }   ε   …




                                Find1
A. The string: {[()]}


              …   ε     {   [ X X    ]   }   ε   …




                             Start
A. The string: {[()]}


              …   ε     {   [ X X    ]   }   ε   …




                             Start
A. The string: {[()]}


              …   ε     {   [ X X Y   }   ε   …




                             Find2
A. The string: {[()]}


              …   ε     {   [ X X Y   }   ε   …




                             Find2
A. The string: {[()]}


              …   ε     {   [ X X Y   }   ε   …




                             Find2
A. The string: {[()]}


              …   ε     {   Y X X Y   }   ε   …




                             Start
A. The string: {[()]}


              …   ε     {   Y X X Y   }   ε   …




                             Start
A. The string: {[()]}


              …   ε     {   Y X X Y   }   ε   …




                             Start
A. The string: {[()]}


              …   ε     {   Y X X Y   }   ε   …




                             Start
A. The string: {[()]}


              …   ε     {   Y X X Y Z   ε   …




                             Find3
A. The string: {[()]}


              …   ε     {   Y X X Y Z   ε   …




                             Find3
A. The string: {[()]}


              …   ε     {   Y X X Y Z   ε   …




                             Find3
A. The string: {[()]}


              …   ε     {   Y X X Y Z   ε   …




                             Find3
A. The string: {[()]}


              …   ε     {   Y X X Y Z   ε   …




                             Find3
A. The string: {[()]}


              …   ε Z Y X X Y Z   ε   …




                        Start
A. The string: {[()]}


              …   ε Z Y X X Y Z   ε   …




                        Start
A. The string: {[()]}


              …   ε Z Y X X Y Z   ε   …




                        Start
A. The string: {[()]}


              …   ε Z Y X X Y Z   ε   …




                        Start
A. The string: {[()]}


              …   ε Z Y X X Y Z   ε   …




                        Start
A. The string: {[()]}


              …   ε Z Y X X Y Z   ε   …




                        Start
A. The string: {[()]}


              …   ε Z Y X X Y Z   ε   …




                        End
A. The string: {[()]}


              …   ε Z Y X X Y Z   ε   …




                        End
A. The string: {[()]}


              …   ε Z Y X X Y Z   ε   …




                        End
A. The string: {[()]}


              …   ε Z Y X X Y Z   ε   …




                        End
A. The string: {[()]}


              …   ε Z Y X X Y Z   ε   …




                        End
A. The string: {[()]}


              …   ε Z Y X X Y Z   ε   …




                        End
A. The string: {[()]}


              …   ε Z Y X X Y Z   ε   …




                        End
A. The string: {[()]}


              …   ε Z Y X X Y Z    ε   …




                        Accepted
B.   The string: [{()}]

                …   ε     [   {   (   )   }   ]   ε   …




                                  Start
B.   The string: [{()}]

                …   ε     [   {   (   )   }   ]   ε   …




                                  Start
B.   The string: [{()}]

                …   ε     [   {   (   )   }   ]   ε   …




                                  Start
B.   The string: [{()}]

                …   ε     [   {   (   )   }   ]   ε   …




                                  Start
B.   The string: [{()}]

                …   ε     [   {   ( X     }   ]   ε   …




                                  Find1
B.   The string: [{()}]

                …   ε     [   { X X    }   ]   ε   …




                               Start
B.   The string: [{()}]

                …   ε     [   { X X    }   ]   ε   …




                               Start
B.   The string: [{()}]

                …   ε     [   { X X Z   ]   ε   …




                               Find3
B.   The string: [{()}]

                …   ε     [   { X X Z   ]   ε   …




                               Find3
B.   The string: [{()}]

                …   ε     [   { X X Z   ]   ε   …




                               Find3
B.   The string: [{()}]

                …   ε     [   Z X X Z   ]   ε   …




                               Start
B.   The string: [{()}]

                …   ε     [   Z X X Z   ]   ε   …




                               Start
B.   The string: [{()}]

                …   ε     [   Z X X Z   ]   ε   …




                               Start
B.   The string: [{()}]

                …   ε     [   Z X X Z   ]   ε   …




                               Start
B.   The string: [{()}]

                …   ε     [   Z X X Z Y   ε   …




                               Find2
B.   The string: [{()}]

                …   ε     [   Z X X Z Y   ε   …




                               Rejected
                                (wrong)
C. The string: {[[()]


              …   ε     {   [   [   (   )   ]   ε   …




                                Start
C. The string: {[[()]


              …   ε     {   [   [   (   )   ]   ε   …




                                Start
C. The string: {[[()]


              …   ε     {   [   [   (   )   ]   ε   …




                                Start
C. The string: {[[()]


              …   ε     {   [   [   (   )   ]   ε   …




                                Start
C. The string: {[[()]


              …   ε     {   [   [   (   )   ]   ε   …




                                Start
C. The string: {[[()]


              …   ε     {   [   [   (   X ]   ε   …




                                Find1
C. The string: {[[()]


              …   ε     {   [   [ X X ]   ε   …




                                Start
C. The string: {[[()]


              …   ε     {   [   [ X X ]   ε   …




                                Start
C. The string: {[[()]


              …   ε     {   [   [ X X Y   ε   …




                                Find2
C. The string: {[[()]


              …   ε     {   [   [ X X Y   ε   …




                                Find2
C. The string: {[[()]


              …   ε     {   [   [ X X Y   ε   …




                                Find2
C. The string: {[[()]


              …   ε     {   [ Y X X Y   ε   …




                             Start
C. The string: {[[()]


              …   ε     {   [ Y X X Y   ε   …




                             Start
C. The string: {[[()]


              …   ε     {   [ Y X X Y   ε   …




                             Start
C. The string: {[[()]


              …   ε     {   [ Y X X Y   ε   …




                             Start
C. The string: {[[()]


              …   ε     {   [ Y X X Y   ε   …




                              End
C. The string: {[[()]


              …   ε     {   [ Y X X Y   ε   …




                              End
C. The string: {[[()]


              …   ε     {   [ Y X X Y   ε   …




                              End
C. The string: {[[()]


              …   ε     {   [ Y X X Y   ε   …




                              End
C. The string: {[[()]


              …   ε     {   [ Y X X Y   ε   …




                              End
C. The string: {[[()]


              …   ε     {   [ Y X X Y       ε   …




                             Rejected
                             (unbalanced)
Turing machine

More Related Content

What's hot

Composite transformation
Composite transformationComposite transformation
Composite transformation
Pooja Dixit
 
Open addressiing &rehashing,extendiblevhashing
Open addressiing &rehashing,extendiblevhashingOpen addressiing &rehashing,extendiblevhashing
Open addressiing &rehashing,extendiblevhashing
SangeethaSasi1
 
pushdown automata
pushdown automatapushdown automata
pushdown automata
Sujata Pardeshi
 
1.1. the central concepts of automata theory
1.1. the central concepts of automata theory1.1. the central concepts of automata theory
1.1. the central concepts of automata theory
Sampath Kumar S
 
Composite transformations
Composite transformationsComposite transformations
Composite transformations
Mohd Arif
 
Variants of Turing Machine
Variants of Turing MachineVariants of Turing Machine
Variants of Turing Machine
Rajendran
 
Maximum Matching in General Graphs
Maximum Matching in General GraphsMaximum Matching in General Graphs
Maximum Matching in General Graphs
Ahmad Khayyat
 
Types of grammer - TOC
Types of grammer - TOCTypes of grammer - TOC
Types of grammer - TOC
AbhayDhupar
 
Prolog & lisp
Prolog & lispProlog & lisp
Prolog & lisp
Ismail El Gayar
 
Daa notes 2
Daa notes 2Daa notes 2
Daa notes 2
smruti sarangi
 
Computer graphics curves and surfaces (1)
Computer graphics curves and surfaces (1)Computer graphics curves and surfaces (1)
Computer graphics curves and surfaces (1)
RohitK71
 
Curves and surfaces
Curves and surfacesCurves and surfaces
Curves and surfaces
Mohammed Mahmoud
 
Enhancement in spatial domain
Enhancement in spatial domainEnhancement in spatial domain
Enhancement in spatial domain
Ashish Kumar
 
COM2304: Digital Image Fundamentals - I
COM2304: Digital Image Fundamentals - I COM2304: Digital Image Fundamentals - I
COM2304: Digital Image Fundamentals - I
Hemantha Kulathilake
 
Image enhancement ppt nal2
Image enhancement ppt nal2Image enhancement ppt nal2
Image enhancement ppt nal2
Surabhi Ks
 
Graphics devices
Graphics devicesGraphics devices
Graphics devices
aa11bb11
 
Turing machine - theory of computation
Turing machine - theory of computationTuring machine - theory of computation
Turing machine - theory of computation
Rubaya Mim
 
Branch and bound
Branch and boundBranch and bound
Branch and bound
Nv Thejaswini
 
Theory of Automata and formal languages Unit 5
Theory of Automata and formal languages Unit 5Theory of Automata and formal languages Unit 5
Theory of Automata and formal languages Unit 5
Abhimanyu Mishra
 
Parallel algorithms
Parallel algorithmsParallel algorithms
Parallel algorithms
Danish Javed
 

What's hot (20)

Composite transformation
Composite transformationComposite transformation
Composite transformation
 
Open addressiing &rehashing,extendiblevhashing
Open addressiing &rehashing,extendiblevhashingOpen addressiing &rehashing,extendiblevhashing
Open addressiing &rehashing,extendiblevhashing
 
pushdown automata
pushdown automatapushdown automata
pushdown automata
 
1.1. the central concepts of automata theory
1.1. the central concepts of automata theory1.1. the central concepts of automata theory
1.1. the central concepts of automata theory
 
Composite transformations
Composite transformationsComposite transformations
Composite transformations
 
Variants of Turing Machine
Variants of Turing MachineVariants of Turing Machine
Variants of Turing Machine
 
Maximum Matching in General Graphs
Maximum Matching in General GraphsMaximum Matching in General Graphs
Maximum Matching in General Graphs
 
Types of grammer - TOC
Types of grammer - TOCTypes of grammer - TOC
Types of grammer - TOC
 
Prolog & lisp
Prolog & lispProlog & lisp
Prolog & lisp
 
Daa notes 2
Daa notes 2Daa notes 2
Daa notes 2
 
Computer graphics curves and surfaces (1)
Computer graphics curves and surfaces (1)Computer graphics curves and surfaces (1)
Computer graphics curves and surfaces (1)
 
Curves and surfaces
Curves and surfacesCurves and surfaces
Curves and surfaces
 
Enhancement in spatial domain
Enhancement in spatial domainEnhancement in spatial domain
Enhancement in spatial domain
 
COM2304: Digital Image Fundamentals - I
COM2304: Digital Image Fundamentals - I COM2304: Digital Image Fundamentals - I
COM2304: Digital Image Fundamentals - I
 
Image enhancement ppt nal2
Image enhancement ppt nal2Image enhancement ppt nal2
Image enhancement ppt nal2
 
Graphics devices
Graphics devicesGraphics devices
Graphics devices
 
Turing machine - theory of computation
Turing machine - theory of computationTuring machine - theory of computation
Turing machine - theory of computation
 
Branch and bound
Branch and boundBranch and bound
Branch and bound
 
Theory of Automata and formal languages Unit 5
Theory of Automata and formal languages Unit 5Theory of Automata and formal languages Unit 5
Theory of Automata and formal languages Unit 5
 
Parallel algorithms
Parallel algorithmsParallel algorithms
Parallel algorithms
 

Viewers also liked

Turing machines
Turing machinesTuring machines
Turing machines
lavishka_anuj
 
Turing machine Introduction
Turing machine IntroductionTuring machine Introduction
Turing machine Introduction
Aram Rafeq
 
Turing machine by_deep
Turing machine by_deepTuring machine by_deep
Turing machine by_deep
Deepjyoti Kalita
 
Turing Machine
Turing MachineTuring Machine
Turing Machine
Anshuman Biswal
 
Turing Machine
Turing MachineTuring Machine
Turing Machine
Rajendran
 
Turing machine
Turing machineTuring machine
Turing machine
Neelamani Samal
 
Alan turing's work before, during & after bletchley park
Alan turing's work before, during & after bletchley parkAlan turing's work before, during & after bletchley park
Alan turing's work before, during & after bletchley park
David Bew
 
The imatatation game
The imatatation gameThe imatatation game
The imatatation game
pheobewebb
 
The trans-Turing Machine
The trans-Turing MachineThe trans-Turing Machine
The trans-Turing Machine
Gabor Vattay
 
Church Turing Thesis
Church Turing ThesisChurch Turing Thesis
Church Turing Thesis
Hemant Sharma
 
Working principle of Turing machine
Working principle of Turing machineWorking principle of Turing machine
Working principle of Turing machine
Karan Thakkar
 
Cracking the Enigma Machine - Rejewski, Turing and the Math that saved the world
Cracking the Enigma Machine - Rejewski, Turing and the Math that saved the worldCracking the Enigma Machine - Rejewski, Turing and the Math that saved the world
Cracking the Enigma Machine - Rejewski, Turing and the Math that saved the world
BradYoung
 

Viewers also liked (16)

Turing machines
Turing machinesTuring machines
Turing machines
 
Turing machine Introduction
Turing machine IntroductionTuring machine Introduction
Turing machine Introduction
 
Turing machine by_deep
Turing machine by_deepTuring machine by_deep
Turing machine by_deep
 
Turing Machine
Turing MachineTuring Machine
Turing Machine
 
Turing Machine
Turing MachineTuring Machine
Turing Machine
 
Turing machine
Turing machineTuring machine
Turing machine
 
Alan turing's work before, during & after bletchley park
Alan turing's work before, during & after bletchley parkAlan turing's work before, during & after bletchley park
Alan turing's work before, during & after bletchley park
 
The imatatation game
The imatatation gameThe imatatation game
The imatatation game
 
The trans-Turing Machine
The trans-Turing MachineThe trans-Turing Machine
The trans-Turing Machine
 
Church Turing Thesis
Church Turing ThesisChurch Turing Thesis
Church Turing Thesis
 
Working principle of Turing machine
Working principle of Turing machineWorking principle of Turing machine
Working principle of Turing machine
 
Cracking the Enigma Machine - Rejewski, Turing and the Math that saved the world
Cracking the Enigma Machine - Rejewski, Turing and the Math that saved the worldCracking the Enigma Machine - Rejewski, Turing and the Math that saved the world
Cracking the Enigma Machine - Rejewski, Turing and the Math that saved the world
 
Automata 3
Automata 3Automata 3
Automata 3
 
Automata 6
Automata 6Automata 6
Automata 6
 
Automata 1
Automata 1Automata 1
Automata 1
 
Turing machine
Turing  machine Turing  machine
Turing machine
 

More from Umar Alharaky

Function Point Counting Practices
Function Point Counting PracticesFunction Point Counting Practices
Function Point Counting Practices
Umar Alharaky
 
CMMI for Development
CMMI for DevelopmentCMMI for Development
CMMI for Development
Umar Alharaky
 
Generalized Stochastic Petri Nets
Generalized Stochastic Petri NetsGeneralized Stochastic Petri Nets
Generalized Stochastic Petri Nets
Umar Alharaky
 
Data integration
Data integrationData integration
Data integration
Umar Alharaky
 
Spam Filtering
Spam FilteringSpam Filtering
Spam Filtering
Umar Alharaky
 
Simulation Tracking Object Reference Model (STORM)
Simulation Tracking Object Reference Model (STORM)Simulation Tracking Object Reference Model (STORM)
Simulation Tracking Object Reference Model (STORM)
Umar Alharaky
 

More from Umar Alharaky (6)

Function Point Counting Practices
Function Point Counting PracticesFunction Point Counting Practices
Function Point Counting Practices
 
CMMI for Development
CMMI for DevelopmentCMMI for Development
CMMI for Development
 
Generalized Stochastic Petri Nets
Generalized Stochastic Petri NetsGeneralized Stochastic Petri Nets
Generalized Stochastic Petri Nets
 
Data integration
Data integrationData integration
Data integration
 
Spam Filtering
Spam FilteringSpam Filtering
Spam Filtering
 
Simulation Tracking Object Reference Model (STORM)
Simulation Tracking Object Reference Model (STORM)Simulation Tracking Object Reference Model (STORM)
Simulation Tracking Object Reference Model (STORM)
 

Recently uploaded

Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 

Recently uploaded (20)

Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 

Turing machine

  • 1.
  • 2. ε ε a0 a1 … an ε ε … RD Input Tape Head Finite Control qi
  • 3.  Create a Turing Machine that takes as input a string consists of different parentheses ( ), [ ] or { } and ensure if that string is balanced – open parentheses are balanced with closed parentheses – and correct – the smaller one does not include the bigger –.  Examples: {[[(()())]()]} Accepted (balanced and correct) [(())(){()()}] Rejected (balanced but wrong) {[()}}{[(())]} Rejected (correct but unbalanced) {()([])}[(()]] Rejected (unbalanced and wrong)
  • 4. Q = { Start , Find1 , Find2 , Find3 , End , Rejected , Accepted } States Description : Start : initial state, that begin to find first symbol ), ] or } then check it with X, Y or Z respectively. Find1 : moving left to find matched symbol (, then check it with X and return to Start state. Find2 : moving left to find matched symbol [, then check it with Y and return to Start state. Find3 : moving left to find matched symbol {, then check it with Z and return to Start state. End : the string is finished, thus moving left to ensure that all symbols are checked. Rejected : there are unchecked (unbalanced) symbols or the string is wrong, therefore string is rejected. Accepted : all symbols are checked (balanced) and the string is correct, therefore string is accepted.
  • 5. Γ ={(,),[,],{,},X,Y,Z,ε} (Tape Alphabet) Σ ={(,),[,],{,}} (Input Alphabet) F = { Accepted } (Finite States) Initial State: Start Blank Symbol: ε
  • 6. δ(q , γ) ( ) [ ] { } X Y Z ε Start Start Find1 Start Find2 Start Find3 Start Start Start End →),],} (,R X,L [,R Y,L {,R Z,L X,R Y,R Z,R ε,L Rejected Rejected Rejected Rejected Rejected Find1 Start Find1 ( X,R - [,L - {,L - X,L Y,L Z,L ε ,R (wrong) (wrong) (wrong) (wrong) (unbalanced) Rejected Rejected Rejected Rejected Find2 - Start Find2 Find2 [ (,L Y,R - {,L - X,L Y,L Z,L ε ,R (unbalanced) (wrong) (wrong) (unbalanced) Rejected Rejected Rejected Find3 Start Find3 Find3 Find3 { (,L - [,L - Z,R - X,L Y,L Z,L ε,R (unbalanced) (unbalanced) (unbalanced) Accepted End Rejected Rejected Rejected End End End ε,R (,L - [,L - {,L - ε (unbalanced) (unbalanced) (unbalanced) X,L Y,L Z,L (correct) (balanced) Rejected Stop - - - - - - - - - - Accepted Stop - - - - - - - - - -
  • 7. X/X,L Find 1 Y/Y,L [/Y,R ε/ε,R Find Accept End ε/ε,L Start (/(,L {/{,L Z/Z,L ε/ε,L Reject 2 ]/Y,L Y/Y,L Find 3 X/Y,D X : Scanned Symbol Y : Written Symbol [/[,L D : Move Direction
  • 8. A. The string: {[()]} … ε { [ ( ) ] } ε … Start
  • 9. A. The string: {[()]} … ε { [ ( ) ] } ε … Start
  • 10. A. The string: {[()]} … ε { [ ( ) ] } ε … Start
  • 11. A. The string: {[()]} … ε { [ ( ) ] } ε … Start
  • 12. A. The string: {[()]} … ε { [ ( X ] } ε … Find1
  • 13. A. The string: {[()]} … ε { [ X X ] } ε … Start
  • 14. A. The string: {[()]} … ε { [ X X ] } ε … Start
  • 15. A. The string: {[()]} … ε { [ X X Y } ε … Find2
  • 16. A. The string: {[()]} … ε { [ X X Y } ε … Find2
  • 17. A. The string: {[()]} … ε { [ X X Y } ε … Find2
  • 18. A. The string: {[()]} … ε { Y X X Y } ε … Start
  • 19. A. The string: {[()]} … ε { Y X X Y } ε … Start
  • 20. A. The string: {[()]} … ε { Y X X Y } ε … Start
  • 21. A. The string: {[()]} … ε { Y X X Y } ε … Start
  • 22. A. The string: {[()]} … ε { Y X X Y Z ε … Find3
  • 23. A. The string: {[()]} … ε { Y X X Y Z ε … Find3
  • 24. A. The string: {[()]} … ε { Y X X Y Z ε … Find3
  • 25. A. The string: {[()]} … ε { Y X X Y Z ε … Find3
  • 26. A. The string: {[()]} … ε { Y X X Y Z ε … Find3
  • 27. A. The string: {[()]} … ε Z Y X X Y Z ε … Start
  • 28. A. The string: {[()]} … ε Z Y X X Y Z ε … Start
  • 29. A. The string: {[()]} … ε Z Y X X Y Z ε … Start
  • 30. A. The string: {[()]} … ε Z Y X X Y Z ε … Start
  • 31. A. The string: {[()]} … ε Z Y X X Y Z ε … Start
  • 32. A. The string: {[()]} … ε Z Y X X Y Z ε … Start
  • 33. A. The string: {[()]} … ε Z Y X X Y Z ε … End
  • 34. A. The string: {[()]} … ε Z Y X X Y Z ε … End
  • 35. A. The string: {[()]} … ε Z Y X X Y Z ε … End
  • 36. A. The string: {[()]} … ε Z Y X X Y Z ε … End
  • 37. A. The string: {[()]} … ε Z Y X X Y Z ε … End
  • 38. A. The string: {[()]} … ε Z Y X X Y Z ε … End
  • 39. A. The string: {[()]} … ε Z Y X X Y Z ε … End
  • 40. A. The string: {[()]} … ε Z Y X X Y Z ε … Accepted
  • 41. B. The string: [{()}] … ε [ { ( ) } ] ε … Start
  • 42. B. The string: [{()}] … ε [ { ( ) } ] ε … Start
  • 43. B. The string: [{()}] … ε [ { ( ) } ] ε … Start
  • 44. B. The string: [{()}] … ε [ { ( ) } ] ε … Start
  • 45. B. The string: [{()}] … ε [ { ( X } ] ε … Find1
  • 46. B. The string: [{()}] … ε [ { X X } ] ε … Start
  • 47. B. The string: [{()}] … ε [ { X X } ] ε … Start
  • 48. B. The string: [{()}] … ε [ { X X Z ] ε … Find3
  • 49. B. The string: [{()}] … ε [ { X X Z ] ε … Find3
  • 50. B. The string: [{()}] … ε [ { X X Z ] ε … Find3
  • 51. B. The string: [{()}] … ε [ Z X X Z ] ε … Start
  • 52. B. The string: [{()}] … ε [ Z X X Z ] ε … Start
  • 53. B. The string: [{()}] … ε [ Z X X Z ] ε … Start
  • 54. B. The string: [{()}] … ε [ Z X X Z ] ε … Start
  • 55. B. The string: [{()}] … ε [ Z X X Z Y ε … Find2
  • 56. B. The string: [{()}] … ε [ Z X X Z Y ε … Rejected (wrong)
  • 57. C. The string: {[[()] … ε { [ [ ( ) ] ε … Start
  • 58. C. The string: {[[()] … ε { [ [ ( ) ] ε … Start
  • 59. C. The string: {[[()] … ε { [ [ ( ) ] ε … Start
  • 60. C. The string: {[[()] … ε { [ [ ( ) ] ε … Start
  • 61. C. The string: {[[()] … ε { [ [ ( ) ] ε … Start
  • 62. C. The string: {[[()] … ε { [ [ ( X ] ε … Find1
  • 63. C. The string: {[[()] … ε { [ [ X X ] ε … Start
  • 64. C. The string: {[[()] … ε { [ [ X X ] ε … Start
  • 65. C. The string: {[[()] … ε { [ [ X X Y ε … Find2
  • 66. C. The string: {[[()] … ε { [ [ X X Y ε … Find2
  • 67. C. The string: {[[()] … ε { [ [ X X Y ε … Find2
  • 68. C. The string: {[[()] … ε { [ Y X X Y ε … Start
  • 69. C. The string: {[[()] … ε { [ Y X X Y ε … Start
  • 70. C. The string: {[[()] … ε { [ Y X X Y ε … Start
  • 71. C. The string: {[[()] … ε { [ Y X X Y ε … Start
  • 72. C. The string: {[[()] … ε { [ Y X X Y ε … End
  • 73. C. The string: {[[()] … ε { [ Y X X Y ε … End
  • 74. C. The string: {[[()] … ε { [ Y X X Y ε … End
  • 75. C. The string: {[[()] … ε { [ Y X X Y ε … End
  • 76. C. The string: {[[()] … ε { [ Y X X Y ε … End
  • 77. C. The string: {[[()] … ε { [ Y X X Y ε … Rejected (unbalanced)