finite automaton
Recently Published Documents


TOTAL DOCUMENTS

254
(FIVE YEARS 42)

H-INDEX

18
(FIVE YEARS 2)

2021 ◽  
Vol volume 13, issue 2 ◽  
Author(s):  
Arman Darbinyan ◽  
Rostislav Grigorchuk ◽  
Asif Shaikh

For finitely generated subgroups $H$ of a free group $F_m$ of finite rank $m$, we study the language $L_H$ of reduced words that represent $H$ which is a regular language. Using the (extended) core of Schreier graph of $H$, we construct the minimal deterministic finite automaton that recognizes $L_H$. Then we characterize the f.g. subgroups $H$ for which $L_H$ is irreducible and for such groups explicitly construct ergodic automaton that recognizes $L_H$. This construction gives us an efficient way to compute the cogrowth series $L_H(z)$ of $H$ and entropy of $L_H$. Several examples illustrate the method and a comparison is made with the method of calculation of $L_H(z)$ based on the use of Nielsen system of generators of $H$.


2021 ◽  
Vol volume 13, issue 2 ◽  
Author(s):  
Arman Darbinyan ◽  
Rostislav Grigorchuk ◽  
Asif Shaikh

For finitely generated subgroups $H$ of a free group $F_m$ of finite rank $m$, we study the language $L_H$ of reduced words that represent $H$ which is a regular language. Using the (extended) core of Schreier graph of $H$, we construct the minimal deterministic finite automaton that recognizes $L_H$. Then we characterize the f.g. subgroups $H$ for which $L_H$ is irreducible and for such groups explicitly construct ergodic automaton that recognizes $L_H$. This construction gives us an efficient way to compute the cogrowth series $L_H(z)$ of $H$ and entropy of $L_H$. Several examples illustrate the method and a comparison is made with the method of calculation of $L_H(z)$ based on the use of Nielsen system of generators of $H$.


2021 ◽  
Author(s):  
Tianchi Chen ◽  
Muhammad Ali Al-Radhawi ◽  
Christopher Voigt ◽  
Eduardo Sontag

A design for genetically-encoded counters is proposed via repressor-based circuits. An N-bit counter reads sequences of input pulses and displays the total number of pulses, modulo 2^N. The design is based on distributed computation, with specialized cell types allocated to specific tasks. This allows scalability and bypasses constraints on the maximal number of circuit genes per cell due to toxicity or failures due to resource limitations. The design starts with a single-bit counter. The N-bit counter is then obtained by interconnecting (using diffusible chemicals) a set of N single-bit counters and connector modules. An optimization framework is used to determine appropriate gate parameters and to compute bounds on admissible pulse widths and relaxation (inter-pulse) times, as well as to guide the construction of novel gates. This work can be viewed as a step toward obtaining circuits that are capable of finite-automaton computation, in analogy to digital central processing units.


2021 ◽  
Vol 2094 (4) ◽  
pp. 042040
Author(s):  
Ja Kravets ◽  
O A R Almusawi ◽  
Ju N Doroshenko ◽  
S N Mamedov ◽  
Yu V Redkin

Abstract The problems and features of security management of the functioning of a multi-node mobile cyber-physical system with a distributed registry based on an automatic model are considered. The algorithm of the functioning of the system node allows for the possibility of increasing or decreasing its resources using various approaches. Models of stochastic automata with a variable structure are used to model such systems. The process of functioning of a node of a system with a distributed registry based on a chain of blocks in the form of a finite automaton with a variable structure and linear tactics is formalized, which ensures that the sequence of changing the variants of the node’s behaviour strategy depends on the conditions of the environment with which it interacts by constructing state matrices.


2021 ◽  
Vol 11 (18) ◽  
pp. 8768
Author(s):  
Alessandro Candeloro ◽  
Carlo Mereghetti ◽  
Beatrice Palano ◽  
Simone Cialdi ◽  
Matteo G. A. Paris ◽  
...  

In a recent paper we have described an optical implementation of a measure-once one-way quantum finite automaton recognizing a well-known family of unary periodic languages, accepting words not in the language with a given error probability. To process input words, the automaton exploits the degree of polarization of single photons and, to reduce the acceptance error probability, a technique of confidence amplification using the photon counts is implemented. In this paper, we show that the performance of this automaton may be further improved by using strategies that suitably consider both the orthogonal output polarizations of the photon. In our analysis, we also take into account how detector dark counts may affect the performance of the automaton.


Author(s):  
Vitalii Statkevych

We consider a Petri net for the producer/consumer problem (one of the classical synchronization problems) with the bounded buffer of size n and the regular formal languages Ln, generated by the net. The objective of this paper is to obtain a regular expression for the set difference of languages Ln \ Lm, n > m. For this purpose, we give the finite automaton which accepts the set difference of mentioned languages, and then we use the state elimination method to obtain the regular expression in the recursive form. The main result is illustrated by the examples. In an appendix, we consider the problem with two producers and two consumers with the bounded buffer of size 1. We give a reachability graph and propose the method for obtaining the regular expression. The explicit formulas are given for the problem with two producers and one consumer and also for the problem with one producer and two consumers.


2021 ◽  
Vol 180 (4) ◽  
pp. 315-331
Author(s):  
Egor Dobronravov ◽  
Nikita Dobronravov ◽  
Alexander Okhotin

Given a two-way finite automaton recognizing a non-empty language, consider the length of the shortest string it accepts, and, for each n ≥ 1, let f(n) be the maximum of these lengths over all n-state automata. It is proved that for n-state two-way finite automata, whether deterministic or nondeterministic, this number is at least Ω(10n/5) and less than (2nn+1), with the lower bound reached over an alphabet of size Θ(n). Furthermore, for deterministic automata and for a fixed alphabet of size m ≥ 1, the length of the shortest string is at least e(1+o(1))mn(log n− log m).


2021 ◽  
Vol 13 (1) ◽  
pp. 180-188
Author(s):  
V. Prokhorchuk

HNN extensions of free abelian groups are considered. For arbitrary prime $p$ it is introduced a class of such extensions that act by finite automaton permutations over an alphabet $ \mathsf{X} $ of cardinality $p$ and belong to $p$-Sylow subgroup of the group of automaton permutations over such $ \mathsf{X} $. As a corollary it implies that all corresponding HNN extensions are residually $p$-finite.


2021 ◽  
Vol 28 (2) ◽  
pp. 89-100

It is inevitable for networks to be invaded during operation. The intrusion tolerance technology comes into being to enable invaded networks to provide the necessary network services. This paper introduces an automatic learning mechanism of the intrusion tolerance system to update network security strategy, and derives an intrusion tolerance finite automaton model from an existing intrusion tolerance model. The proposed model was quantified by the Markov theory to compute the stable probability of each state. The calculated stable probabilities provide the theoretical guidance and basis for administrators to better safeguard network security. Verification results show that it is feasible, effective, and convenient to integrate the Markov model to the intrusion tolerance finite automaton.


Sign in / Sign up

Export Citation Format

Share Document