Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

1. Let  ∑ ={f0,1}, and let A be the language {abwba| a,b Ε ∑ , w Ε ∑*}. Construct a DFA that accepts precisely strings in A.

2. Convert the following NFA into an equivalent DFA.

1177_NFA.jpg

3. (Floyd & Beigel) You and an opponent are seated at a table, and on the table is a square board. At each of the four corners of the board, there is a disc, each one red on one side and black on the other. You are blindfolded, and thus cannot see the con guration of the discs, but you claim that you can ip the discs such that they are all facing with the same color up. On each move, you can ip either one or two discs (either adjacent or diagonal to each other). If this results in a winning state, your opponent must announce that. Otherwise, your opponent may choose to rotate the board 0° , 90° , 180° , or 270° .

Find the shortest sequence of moves that is guaranteed to win the game, no matter what rotations of the board are made. Be sure to include a proof that your solution is correct and that it is the shortest possible.

4. For a language A over an alphabet ∑, define the complement of A, A‾ = {x|x Ε≠ A}. Prove that the class of regular languages is closed under complementation.
5. For a string w = w1w2.....wn, define the reverse of w, wR = wn.....w2w1. For a language A, define AR= {wR |wΕA}. Show that, if A is regular, then so is AR.

6. For languages A and B, let the shu e of A and B be the language

{w|w = a1b1 .....akbk; where a1.....ak Ε A and b1......bk Ε B; with each ai,bi Ε ∑*} Prove that the class of regular languages is closed under shuffe.

7. Define a 2165_for all.jpgFA to be a 5-tuple M = (Q, ∑, δ,q0, F), where δ : QX∑u{Ε}→P(Q) is defined as for a NFA. As a dual notion to nondeterministic acceptance, we say that M accepts x Ε ∑* if every possible state of M after reading x is an accepting state. Prove that a language is regular if and only if it is recognized by a 2165_for all.jpgFA.

8. Let M be a NFA with k states.

(a) Prove that, if L(M) ≠ ø;, then L(M) contains a string of length at most k (HINT: Think about the possibilities for path length in M, keeping in mind the Pigeonhole Principle.)

(b) Show that, even if L(M)‾ ≠ ø ;, it is not necessarily the case that L(M)‾ has a string of length at most k.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91327

Have any Question? 


Related Questions in Computer Engineering

1 what is separation of duties how can it be used to

1. What is separation of duties? How can it be used to improve an organization's information security practices? 2. What is job rotation, and what benefits does it offer an organization?

Do a complete research and reading in order to understand

Do a complete research and reading in order to understand how multimegawatt induction generators can be controlled with a scalar control. Assume power electronic devices capable of handling high voltages and high current ...

Explain what the specific key environmental forces are that

Explain what the specific key environmental forces are that created an opportunity for your company. Company, drive through Wine store.

Question 11 corporate culture has been said to be the

Question 1: 1. Corporate culture has been said to be the toughest component of a business to change. Do you agree or disagree with this statement and why? 2. Define the five types of power according to French and Raven's ...

Describe the six steps you should follow when creating an

Describe the six steps you should follow when creating an OO application. Why do you think it is important to complete the steps in the proper order? What results when they are not in the proper order? After your initial ...

This chapter covered network management whereas the

This chapter covered network management, whereas the previous chapter covered network security. Note that network design tasks are often interwoven, however, and shouldn't be considered discrete just because a book is di ...

A company publishes the design of its security software

A company publishes the design of its security software product in a manual that accompanies the executable software. a. In what ways does this satisfy the principle of open design? In what ways does it not? b. Given tha ...

Build a weighted graph that models a map of the area where

Build a weighted graph that models a map of the area where you live. Use Dijkstra's algorithm to determine the shortest path from a starting vertex to the last vertex.

Using the internet research wireless lan applications

Using the Internet, research wireless LAN applications. Compile a list of at least five applications that you had not imagined before for WLANs, and write a one-paragraph description below each one. The paragraph should ...

1 the as number in an organization is 24101 find the range

1. The AS number in an organization is 24101. Find the range of multicast addresses that the organization can use in the GLOP block. 2. A multicast address for a group is 232.24.60.9. What is its 48-bit Ethernet address ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro