Discrete math, Basic Computer Science

Assignment Help:
Below you will find a question the areas of automata. Solve the problem showing all steps. Thoroughly explain how and why you performed each step with complete sentences.

A finite-state automaton is given by the 5-tuple (Q, ?, d, q, F), where

Q = the finite set of states = {A, B, C}

? = the Alphabet (inputs) = {x, y}

d = the transition function using the alphabet as inputs to the states

q = the initial state = {A}

F = Accepting (or final) state = {C}

The transition table for the automaton is given by:






d

d




x

y


A

A

B


B

A

C


C

A

C



(i). Draw the corresponding transition diagram (digraph).

(ii). Provide 5 strings that are in the language generated by the automaton.

(iii). Provide 5 strings, that use the same inputs, which are not in the language generated by the automata.

(iv). Write a general statement that describes when a string is part of the language generated by the above automata and when that string is not in the language.


Related Discussions:- Discrete math

Three specific sections of the microprocessor, • CPU Structure This section...

• CPU Structure This section, with a simplified model of a central processing unit as an instance, takes you through the role of each of the major basic parts of the CPU. It also l

Elements of cpu, ELEMENTS OF CPU: The CPU is a complex IC chip having ...

ELEMENTS OF CPU: The CPU is a complex IC chip having millions of transistors. As mentioned earlier, a CPU has three major identifiable parts: Control Unit (CU), Arithmetic & l

Why we need data mining? Give an example to illustrate your, Why we need da...

Why we need data mining? Give an example to illustrate your answer.

Storage mechanism of magnetic disk, Storage Mechanism of Magnetic disk: ...

Storage Mechanism of Magnetic disk: Storage Mechanism: Magnetic disk drives contain metal disks that are coated on both sides with an iron oxide recording material. Several

Methods of working with files, There are two methods to work with files, th...

There are two methods to work with files, the first one is through file control blocks or "FCB" and the second one is through communication channels, also identified as "handles".

Input Devices, Keyboards, microphones, and mice have generally been used as...

Keyboards, microphones, and mice have generally been used as the standard input devices for most computer systems. The popularity of video and computer games has led to the introdu

Computer security, concepts and components of computer security

concepts and components of computer security

Assignment, Assignment of computer science

Assignment of computer science

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd