Skip to main content

ALC & AT

   

Introduction to Automata Theory / Automata Language & Computation / Theory of Computation by PATHAN AHMED KHAN





Automata Theory is a branch of computer science that deals with designing abstract self propelled computing devices that follow a predetermined sequence of operations automatically. 

An automaton with a finite number of states is called a Finite Automaton. 

The term "Automata" is derived from the Greek word "αὐτόματα" which means "self-acting". An automaton (Automata in plural) is an abstract self-propelled computing device which follows a predetermined sequence of operations automatically.

An automaton with a finite number of states is called a Finite Automaton (FA) or Finite State Machine (FSM).


Formal definition of a Finite Automaton:

An automaton can be represented by a 5-tuple (Q, ∑, δ, q0, F), where −
Q is a finite set of states.
∑ is a finite set of symbols, called the alphabet of the automaton.
δ is the transition function.
q0 is the initial state from where any input is processed (q0 ∈ Q).
F is a set of final state/states of Q (F ⊆ Q).

Related Terminologies:

Alphabet:
Definition − An alphabet is any finite set of symbols.
Example − ∑ = {a, b, c, d} is an alphabet set where ‘a’, ‘b’, ‘c’, and ‘d’ are symbols.
String:
Definition − A string is a finite sequence of symbols taken from ∑.
Example − ‘cabcad’ is a valid string on the alphabet set ∑ = {a, b, c, d}
Length of a String:
Definition − It is the number of symbols present in a string. (Denoted by |S|).
Examples −
If S = ‘cabcad’, |S|= 6
If |S|= 0, it is called an empty string (Denoted by λ or ε)


Kleene Star:
Definition − The Kleene star, ∑*, is a unary operator on a set of symbols or strings, ∑, that gives the infinite set of all possible strings of all possible lengths over ∑ including λ.

Representation − ∑* = ∑0 ∪ ∑1 ∪ ∑2 ∪……. where ∑p is the set of all possible strings of length p.
Example − If ∑ = {a, b}, ∑* = {λ, a, b, aa, ab, ba, bb,………..}

Kleene Closure / Plus:
Definition − The set ∑+ is the infinite set of all possible strings of all possible lengths over ∑ excluding λ.
Representation − ∑+ = ∑1 ∪ ∑2 ∪ ∑3 ∪…….
∑+ = ∑* − { λ }
Example − If ∑ = { a, b } , ∑+ = { a, b, aa, ab, ba, bb,………..}

Prefix and Suffix of a string:
Prefix String means number of leading symbols of that String.
Example:
String is “abc”
Prefix of a String is: ε, a, ab, abc.
Suffix of a String:  Number of its trailing symbols of that String.
String is “abc”
Suffix of a String is : ε, c,bc,abc

Language:
Definition − A language is a subset of ∑* for some alphabet ∑. It can be finite or infinite.
Example − If the language takes all possible strings of length 2 over ∑ = {a, b}, then L = { ab, aa, ba, bb }


Finite Automaton can be classified into two types −
Deterministic Finite Automaton (DFA)
Non-deterministic Finite Automaton (NDFA / NFA)




Comments

Popular posts from this blog

DESIGN AND ANALYSIS OF ALGORITHMS – QUESTION BANK (CSE)

   ISL   ENGINEERING   COLLEGE DEPARTMENT   OF   COMPUTER   SCIENCE   AND   ENGINEERING DESIGN   AND   ANALYSIS   OF   ALGORITHMS QUESTION   BANK                                         BE III Year II Semester (A & B Sections) –PC 603 CS     Academic   Year: 2020-21 SHORT   ANSWER   QUESTIONS   UNIT-I 1.        Why   is an algorithm analysis required? 2.        State   about   UNION &   FIND   operations. 3.        List   out   the   UNION   algorithm   using   weighting   rule. 4.        Given   f(n)=10n 2 +4n+3,   then   prove   that   f(n)=O(n 2 ). 5.  ...

Cryptography and Network Security (CNS)

  CRYPTOGRAPHY AND NETWORK SECURITY (CNS) Unit I to V  Click Here Attacks on Computers and Computer Security SYLLABUS UNIT – I Security Concepts : Introduction, The need for security, Security approaches, Principles of security, Types of Security attacks, Security services, Security Mechanisms, A model for Network Security Cryptography Concepts and Techniques : Introduction, plain text and cipher text, substitution techniques, transposition techniques, encryption and decryption, symmetric and asymmetric key cryptography, steganography, key range and key size, possible types of attacks. UNIT – II Symmetric key Ciphers : Block Cipher principles, DES, AES, Blowfish, RC5, IDEA, Block cipher operation, Stream ciphers, RC4. Asymmetric key Ciphers : Principles of public key cryptosystems, RSA algorithm, Elgamal Cryptography, Diffie-Hellman Key Exchange, Knapsack Algorithm. UNIT – III Cryptographic Hash Functions : Message Authentication, Secure Hash Algorithm (SHA- 512), Message auth...

Introduction

  Welcome to Best Information for Learners and Job Seekers. Here you can find the best videos related to education and new technologies in the market as well as Govt. and Private Jobs. In this blog I am passing the information to users for user betterment to find the Education Material, Videos, Jobs and Others. Subscribe the You Tube Channel for E-learning Courses. PATHAN AHMED KHAN M.Tech.(Ph.D.)  Assistant Professor ISL Engineering College Mobile No: 0091-8019309323 email id: pathan.ahmed0504@gmail.com                 pathansknowledgehub@gmail.com