Normal Algorithmetic Implementation of Cellular Automata

Size: px
Start display at page:

Download "Normal Algorithmetic Implementation of Cellular Automata"

Transcription

1 Normal Algorithmetic Implementation of Cellular Automata G. Ramesh Chandra, V. Dhana Lakshmi Dept. of Computer Science and Engineering VNR Vignana Jyothi Institute of Engineering & Technology Hyderabad, India E. G. Rajan Founder President Pentagram Research Centre Pvt. Ltd. Hyderabad, India Abstract Markov s Normal Algorithms are idealized sequential machines. Von Neumann s Cellular Automata are idealized parallel processing machines. This paper introduces a state-of-the-art of realizing cellular automata in terms of normal algorithms. Keywords-normal algorithms, cellular automata, cellular logic array processing I. INTRODUCTION Traditionally, an image processing operation in spatial domain is expressed as a transformation g(x,y) = T[f(x,y)], where f(x,y) is the input image, g(x,y) is the output image and T is the transformation operator of f, defined over some neighbourhood of (x,y) [10], [12]. Regardless of the nature of operations, however, the general approach is to scan a given 2-D array by a 3x3 window and update all the pixel values with the computed ones, the computations involving the coefficients of the window and those of the image pixels scanned by it. But, there are occasions when one can carry out a required operation using a simple pattern matching and updating technique instead of computing update values from an expression involving the window coefficients and the corresponding image pixel values. For example, let us take the case of edge detection which is an operation of locating the pixels that form a transition between two regions of distinct gray-level properties in an image. Numerous edge detection algorithms are available in the literature among which use of Sobel Operators has become by far one of the most popular edge detection techniques because of their advantages in computational speed. Alternatively, the pattern-directed edge detection technique that is given in section 14, makes use of a simple nonnumerical operation of assigning the gray value 0 to a pixel if it along with its neighbors forms a particular homogeneous pattern inside a 3 x 3 window. By using this edge detection technique, we could achieve a considerable increase in the computational speed as compared to that observed in obtaining a gradient image using Sobel operators. All these amount to say that pattern-directed array processing techniques plays an important role in the image processing practice where high-throughput image understanding systems are deemed. Digital images are represented as symbolic array configurations, and are processed using pattern-directed schemes of Generalized Markov Algorithms. A pattern-directed scheme of this kind essentially consists of a finite number of Search and Substitute rules called Conjoint Substitution Formulas. Since the notion of a conjoint substitution formula is closely related to that of pattern substitution using neighborhood principles, it is then reasonable to treat an image as an input configuration to a Cellular Automaton, and realize filtering operations on the image in terms of cellular automata evolutions carried out by Generalised Markov Algorithms [5], [7]. In this paper, we discuss some of the salient features of cellular automata and their generalizations. II. THE NOTION OF A CELLULAR AUTOMATON The concept of Cellular Automata was originally introduced by von Neumann and Ulam, under the name cellular spaces, as a possible idealization of a biological systems, with a particular purpose of modeling biological self-reproduction [8], [10]. Later, this concept has been reinterpreted, for various purposes, under different names like tessellation automata, homogeneous structures, cellular structures and iterative arrays. The term cellular automation, in general, denotes a regular uniform lattice, usually infinite in extent, with a discrete variable at each site. The state of a cellular automation, at a time instant, is determined by the corresponding configuration, that is, by the array of values (numerical) of these variables at that time instant. We are concerned here only with the following three types of cellular automata: (i) one-dimensional cellular automata, (ii) two-dimensional cellular automata and (iii) threedimensional cellular automata, and we denote their configurations respectively as (i) linear array configuration, (ii) square array configuration and (iii) cube array configuration. A cellular automaton evolves in discrete time steps, with the value of the variable at one site being affected by the values of the sites in its neighborhood on the previous time step. By neighborhood of a site we mean the site itself along with all or some of its immediately adjacent sites. The site values corresponding to a configuration at a particular time step, say t, are updated, all at once, based on the values in

2 their neighborhood, according to as definite set of updating rules. The resulting configuration at time step t+1, is the evolved version of the one at time step t. Updating rules are classified in the following manner. An updating rule which involves the neighborhood values of the just previous time step only, is referred as a local rule or a first rule, whereas the one which involves the neighborhood values of the previous two time steps is called a second order rule. All updating rules beyond second order rules are called higher order rules. A cellular automation which evolves purely according to a fixed set of local rules is called a first order cellular automaton. Second and higher order cellular automata are to be understood in the same manner. We are concerned here only with first order cellular automaton. III. ONE DIMENSIONAL NORMAL ALGORITHMIC CELLULAR AUTOMATA As defined above, a one dimensional N-ary valued cellular automata C consists of a line of sites, with each site taking on any of the N possible values, updated in discrete time steps according to a deterministic rule involving a local neighborhood of sites around it. The value of a site i at time step t is denoted by ξ (t) i and is a symbol chosen from an alphabet A = { 0,1,, N-1 }. A sequence of such symbols from the alphabet A, denoting the values of the sites at a time step t, is called a Configuration of C. Now, the symbols present in a configuration could be rewritten in accordance with a local rule, so that a new configuration evolves. By the neighborhood of a site, we mean the site itself together with r adjacent sites to its immediate left and r adjacent sites to its immediate right. For example, a three neighborhood of a site i of a cellular automaton C is the triple formed by i and its immediate left and right neighbors. The triple corresponds to the word ξ (t) i-1 ξ (t) i ξ (t) i+1 in the configuration at a time step t. Now, when a rule φ is applied to the configuration at time step t, the value of an i th site ξ (t) i, is updated as ξ (t+1) i by rewriting the word ξ (t) i-1 ξ (t) i ξ (t) i+1 corresponding to its neighborhood triple, as the word ξ (t+1) i ξ (t) i+1. The problem of our immediate concern now is the retrieval of information about the previous value of the i th site after the updating, and its use in rewriting the ξ (t) i ξ (t) i+1 ξ (t) i+2 corresponding to the next immediate triple formed by the i th, (i+1) th and (i+2) th sites. What is usually done is that the value of the site i at time step t is stored before it is updated and retrieved for use in the updating of the right adjacent site value. However, we solve this problem in the following manner [11]. Let us consider a word ξ (t) i-1 ξ (t) i ξ (t) i+1 which is present in a configuration of a three neighborhood automaton C, at a time step t. Now, we rewrite this word, according to a substitution formula of the type: ξ (t) i-1 ξ (t) i ξ (t) i+1 ξ (t+1) i ξ (t) i ξ (t) i+1 so that the i th site value is updated and at the same time its previous value is preserved for further use in the updating of the (i+1) th site value. Thus at time step (t+1), a new configuration evolves as a result of an exhaustive updating of all the site values other than the first and the last ones of the configuration at time step t. Successively, we flank with the symbol 0, both the left and the right ends of this new configuration at time step (t+1), so that its length is preserved [6]. The above argument is valid for the normal algorithmic realization of any N-ary valued (2r+1) neighborhood cellular automaton [11]. In what follows, we make use of the above technique and construct a normal algorithm N 1N3CA for realizing N-ary valued 3-neighbourhood cellular automata. We need the following alphabets: Alphabet of terminal: A = { } Alphabet of nonterminal: E = { α } Site variables are denoted by ξ, η, and μ, and they take on values from A. The scheme N 1N3CA given below is constructed over the union of A and E. N 1N3CA is a composition of two normal algorithms N 1 and N 2 [5],[7],[9]. Example 1: Let us consider the case of a binary valued three neighborhood cellular automaton C which can be realized normal algorithmically over the union of the alphabet A = {0, 1} and E = {α}. At a time step t, let C (t) be the configuration of C, and ξ (t) i-1 ξ (t) i ξ (t) i+1 be the word corresponding to the values of a neighborhood triple formed by an i th site and its neighbors. A three neighborhood triple can hold 2 3 possible combinations of symbols from the alphabet A. An updating rule φ in this case, is a system of eight substitution formulas with their left parts consisting of the eight words of length 3 from A and their right parts consisting of single letters from A. If we arrange all the eight words as per the increasing order of their numerical counterparts, then we can code a rule φ as a word L of length 8 from the alphabet A. In fact, one can generate 2 8 updating rules as shown in table 1. Table 1: Coded rules of a 3-neighborhood binary valued Normal algorithmic cellular automaton

3 Let us take a finite length configuration C (t) = and apply rule φ 3 to it. This configuration consists of seven symbols, and it can be factored into five triples 001, 010, 101, 010 and 100 from left to right. The new configuration that evolves as the result of the application of rule φ 3 is C (t+1) = Let us see now, how this new configuration could be obtained by means of the normal algorithm N 123CA. Remarks: N 123CA (C (t) ) ~ N 2 (N 1 (C (t) )). The 0 th formula of the scheme of N 1 represents a set of 8 substitution formulas: N 123CA : N 1 : α α α α α α α α N 2 : IV. TWO DIMENSIONAL NORMAL ALGORITHMIC CELLULAR AUTOMATA A two dimensional N-ary valued cellular automaton C consists of a lattice of sites, with each site taking on any of the N possible values, updated in discrete time steps according to a deterministic rule involving a local neighborhood of sites surrounding it. Though one can think of several possible lattices and neighborhood structures for two dimensional cellular automata, we are concerned here, only with the square lattices with five and nine neighborhood structures shown in figure 1. Five neighborhood structure Nine neighborhood structure Figure 1: 2D neighbourhood structures The value of a site i,j at a time step t is denoted by ξ (t) i,j and is a symbol chosen from an alphabet A = { 0, 1,, N-1 }. Now, the symbol present in each site of a square lattice could be rewritten in accordance with a local rule which involves the values of either four or eight of its neighboring sites also, so that a new square lattice configuration evolves. A five-neighborhood cellular automaton evolves according to a rule φ, where ξ (t+1) i,j = φ [ ξ (t) i,j, ξ (t) i, j+1, ξ (t) i+1,j, ξ (t) i,j+1, ξ (t) i-1, j ]. A nine-neighborhood cellular automaton evolves according to a rule φ, where ξ (t+1) i,j = φ [ ξ (t) i,j, ξ (t) i, j+1, ξ (t) i+1, j+1, ξ (t) i+1, j, ξ (t) i+1, j+1, ξ (t) i, j-1, ξ (t) i-1, j-1, ξ (t) i-1, j, ξ (t) i-1, j+1 ] Let us recall from earlier discussions, that a normal algorithm N over an alphabet A is applicable only to onedimensional strings consisting of symbols from A and not to two-dimensional arrays of symbols from A. This primarily causes difficulty in constructing a normal algorithm for realizing a two-dimensional cellular automaton. However, as a first step to overcome this difficulty, we represent an array of symbols in the form of a one-dimensional string, in the following manner. Let us consider at a time step t, a finite, square lattice configuration of n rows of symbols from an alphabet A, each row consisting of n number of symbols. Now, we represent this array as: )ξ (t) 1,1 ξ (t) 1,2 ξ (t) 1,3. ξ (t) 1, n & ξ (t) 2, 1 ξ (t) 2, 2 ξ (t) 2, 3 ξ (t) 2, n &. & ξ (t) i,1 ξ (t) i,2 ξ (t) i,3. ξ (t) i, n &.. & ξ (t) n, 1 ξ (t) n, 2 ξ (t) n, 3 ξ (t) n, n where the symbol ) and & are called delimiters i.e. separating symbols, and they are not in the alphabet A. Let us take for example, a square lattice of five rows with each row consisting of five sites. ξ (t) 1,1 ξ (t) 1,2 ξ (t) 1,3 ξ (t) 1, 4 ξ (t) 1,5 ξ (t) 2,1 ξ (t) 2,2 ξ (t) 3,3 ξ (t) 2, 4 ξ (t) 2,5 ξ (t) 3,1 ξ (t) 3,2 ξ (t) 3,3 ξ (t) 3, 4 ξ (t) 3,5 ξ (t) 4,1 ξ (t) 4,2 ξ (t) 4,3 ξ (t) 4, 4 ξ (t) 4,5 ξ (t) 5,1 ξ (t) 5,2 ξ (t) 5,3 ξ (t) 5, 4 ξ (t) 5,5 Then the one-dimensional equivalent string corresponding to an array configuration of this lattice at a time step t, would be of the form: P = )ξ (t) 1,1 ξ (t) 1,2 ξ (t) 1,3 ξ (t) 1, 4 ξ (t) 1,5 & ξ (t) 2,1 ξ (t) 2,2 ξ (t) 3,3 ξ (t) 2,4 ξ (t) 2,5 & ξ (t) 3,1 ξ (t) 3,2 ξ (t) 3,3 ξ (t) 3, 4 ξ (t) 3,5 & ξ (t) 4,1 ξ (t) 4,2 ξ (t) 4,3 ξ (t) 4, 4 ξ (t) 4,5 ξ (t) 5,1 ξ (t) 5,2 ξ (t) 5,3 ξ (t) 5, 4 ξ (t) 5,5 Having thus represented a two-dimensional array configuration as a one-dimensional string P, our next step would be to find out a method for applying five or nineneighborhood updating rules to it. In the traditional sense, the five neighborhood of a site, say, (3,3) of the array configuration of P is viewed as the 5- tuple formed by the site (3,3) and its immediate surrounding neighbors (3,4), (4,3), (3,2) and (2,3). Then, the word consisting of the symbols corresponding to the values of this 5-tuple at a time step t, is ξ (t) 3,3 ξ (t) 3, 4 ξ (t) 4,3 ξ (t) 3, 2 ξ (t) 2,3. Now, the fact that this word does not occur in the string P either fully or in parts, poses some difficulty in making use of this word in a substitution formula that implements a fiveneighborhood rule. However, we overcome this difficulty in the following manner. Let us consider the word ξ (t) 2, 3 ξ (t) 2,3 ξ (t) 2, 4 ξ (t) 3,2 ξ (t) 3, 3 ξ (t) 3,4 ξ (t) 4, 2 ξ (t) 4,3 ξ (t) 4, 4 which occurs in P, in parts, as

4 triples. This word contains all the symbols corresponding to the values of the 5-tuple and also certain other symbols which are called quiescent symbols (i.e., inactive symbols) as far as the five-neighborhood rule is concerned. Now a substitution formula of the type: ξ (t) 2,2 ξ (t) 2,3 ξ (t) 2, 4 ξ (t) 3,2 ξ (t) 3,3 ξ (t) 3, 4 ξ (t) 4,2 ξ (t) 4,3 ξ (t) 4, 4 ξ (t+1) 3, 3 could be used to update the values of the site (3,3). The symbols and denote respectively the left and the right parentheses. They are introduced here in order to show distinctly the triples which occur in P at three different places. We refer to the above substitution formula as a Conjoint Substitution Formula, based on the fact that it is a composition of three simple substitution formulas: (i) ξ (t) 2,2 ξ (t) 2,3 ξ (t) 2, 4 ξ (t+1) 3, 3 (ii) ξ (t) 3,2 ξ (t) 3,3 ξ (t) 3, 4 Λ and (iii) ξ (t) 4,2 ξ (t) 4,3 ξ (t) 4, 4 Λ By the term Conjoint Substitution, we mean the testing of a given string for the occurrences of certain words listed in an order of precedence and substituting them, in case all of them occur, by their values, in the same order. Now, the nine-neighborhood of the site (3,3)is the 9-tuple formed by the site (3,3)and its neighbors (3,4), (4,4), (4,3), (4,2), (3,2), (2,2), (2,3) and (2,4). On the same lines that we saw earlier, the word ξ (t) 2,2 ξ (t) 2,3 ξ (t) 2, 4 ξ (t) 3,2 ξ (t) 3,3 ξ (t) 3, 4 ξ (t) 4,2 ξ (t) 4,3 ξ (t) 4, 4 which occurs in P, in parts, as triples, can be used in a conjoint substitution formula that implements a nine-neighborhood rule. So far we have seen that the value of a site (i,j) in a square array configuration at a time step t, could be updated according to a rule, by rewriting the word corresponding to its five or nine-neighborhood in the one-dimensional equivalent string. The problem that we face now, is the retrieval of information about the previous value of the site (i,j) after the updating, and its use in the updating of the values of the site (i,j+1), (i+1,j-1), (i+1,j) and (i+1,j+1). We solve this problem in the following manner: Let us consider the one-dimensional equivalent word : P = ) ξ (t) 1,1 ξ (t) 1,2 ξ (t) 1,3 ξ (t) 1, 4 ξ (t) 1,5 & ξ (t) 2,1 ξ (t) 2,2 ξ (t) 3,3 ξ (t) 2,4 ξ (t) 2,5 & ξ (t) 3,1 ξ (t) 3,2 ξ (t) 3,3 ξ (t) 3, 4 ξ (t) 3,5 & ξ (t) 4,1 ξ (t) 4,2 ξ (t) 4,3 ξ (t) 4, 4 ξ (t) 4,5 ξ (t) 5,1 ξ (t) 5,2 ξ (t) 5,3 ξ (t) 5, 4 ξ (t) 5,5 corresponding to the finite array configuration : ξ (t) 1,1 ξ (t) 1,2 ξ (t) 1,3 ξ (t) 1, 4 ξ (t) 1,5 ξ (t) 2,1 ξ (t) 2,2 ξ (t) 3,3 ξ (t) 2, 4 ξ (t) 2,5 ξ (t) 3,1 ξ (t) 3,2 ξ (t) 3,3 ξ (t) 3, 4 ξ (t) 3,5 ξ (t) 4,1 ξ (t) 4,2 ξ (t) 4,3 ξ (t) 4, 4 ξ (t) 4,5 ξ (t) 5,1 ξ (t) 5,2 ξ (t) 5,3 ξ (t) 5, 4 ξ (t) 5,5 and rewrite P as : ) ξ (t) 1,1ξ (t) 1,2 ξ (t) 1,3 ξ (t) 1, 2 ξ (t) 1,3 ξ (t) 1,4 ξ (t) 1,3 ξ (t) 1, 4 ξ (t) 1,5 & ξ (t) 2,1 ξ (t) 2,2 ξ (t) 2,3 ξ (t) 2, 2 ξ (t) 2,3 ξ (t) 2,4 ξ (t) 2,3 ξ (t) 2, 4 ξ (t) 2,5 & ξ (t) 3,1ξ (t) 3,2 ξ (t) 3,3 ξ (t) 3, 2 ξ (t) 3,3 ξ (t) 3,4 ξ (t) 3,3 ξ (t) 3, 4 ξ (t) 3,5 & ξ (t) 2,1ξ (t) 2,2 ξ (t) 2,3 ξ (t) 2, 2 ξ (t) 2,3 ξ (t) 2,4 ξ (t) 2,3 ξ (t) 2, 4 ξ (t) 2,5 & ξ (t) 3,1ξ (t) 3,2 ξ (t) 3,3 ξ (t) 3, 2 ξ (t) 3,3 ξ (t) 3,4 ξ (t) 3,3 ξ (t) 3, 4 ξ (t) 3,5 & ξ (t) 4,1ξ (t) 4,2 ξ (t) 4,3 ξ (t) 4, 2 ξ (t) 4,3 ξ (t) 4,4 ξ (t) 4,3 ξ (t) 4, 4 ξ (t) 4,5 & ξ (t) 3,1ξ (t) 3,2 ξ (t) 3,3 ξ (t) 3, 2 ξ (t) 3,3 ξ (t) 3,4 ξ (t) 3,3 ξ (t) 3, 4 ξ (t) 3,5 & ξ (t) 4,1ξ (t) 4,2 ξ (t) 4,3 ξ (t) 4, 2 ξ (t) 4,3 ξ (t) 4,4 ξ (t) 4,3 ξ (t) 4, 4 ξ (t) 4,5 & ξ (t) 5,1ξ (t) 5,2 ξ (t) 5,3 ξ (t) 5, 2 ξ (t) 5,3 ξ (t) 5,4 ξ (t) 5,3 ξ (t) 5, 4 ξ (t) 5,5 Let us call this string P. Now, let us take the case of updating the values of all the sites according to a rule φ. The first site value that could be updated in P is ξ (t) 2,2, and the string that results after this updating would be : ) ξ (t+1) 2,2 ξ (t) 1,2 ξ (t) 1,3 ξ (t) 1, 4 ξ (t) 1,3 ξ (t) 1,4 ξ (t) 1,5 & ξ (t) 2, 2 ξ (t) 2,3 ξ (t) 2, 4 ξ (t) 2,3 ξ (t) 2, 4 ξ (t) 2,5 & ξ (t) 3,2 ξ (t) 3,3 ξ (t) 3, 4 ξ (t) 3,3 ξ (t) 3,4 ξ (t) 3,5 & ξ (t) 2, 1 ξ (t) 2,2 ξ (t) 2,3 ξ (t) 2,2 ξ (t) 2,3 ξ (t) 2,4 ξ (t) 2,3 ξ (t) 2,4 ξ (t) 2,5 & ξ (t) 3, 1 ξ (t) 3,2 ξ (t) 3,3 ξ (t) 3,2 ξ (t) 3, 3 ξ (t) 3,4 ξ (t) 3,3 ξ (t) 3,4 ξ (t) 3,5 & ξ (t) 4,1 ξ (t) 4,2 ξ (t) 4,3 ξ (t) 4,2 ξ (t) 4, 3 ξ (t) 4,4 ξ (t) 4,3 ξ (t) 4,4 ξ (t) 4, 5 & ξ (t) 3,1 ξ (t) 3,2 ξ (t) 3,3 ξ (t) 3,2 ξ (t) 3,3 ξ (t) 3,4 ξ (t) 3,3 ξ (t) 3,4 ξ (t) 3, 5 & ξ (t) 4,1 ξ (t) 4,2 ξ (t) 4,3 ξ (t) 4, 2 & ξ (t) 4,3 ξ (t) 4,4 ξ (t) 4,3 ξ (t) 4,4 ξ (t) 4,5 & ξ (t) 5,1ξ (t) 5,2 ξ (t) 5,3 ξ (t) 5, 2 ξ (t) 5,3 ξ (t) 5,4 ξ (t) 5,3 ξ (t) 5, 4 ξ (t) 5,5 The second and third site values that could be updated successively in P are ξ (t) 2,3 and ξ (t) 2,4 and the string that results after these updating would be : ) ξ (t+1) 2, 2 ξ (t+1) 2,3 ξ (t+1) 2, 4 &&& ξ (t) 2, 1 ξ (t) 2,2 ξ (t) 2,3 ξ (t) 2,2 ξ (t) 2,3 ξ (t) 2,4 ξ (t) 2,3 ξ (t) 2,4 ξ (t) 2,5 & ξ (t) 3, 1 ξ (t) 3,2 ξ (t) 3,3 ξ (t) 3,2 ξ (t) 3, 3 ξ (t) 3,4 ξ (t) 3,3 ξ (t) 3,4 ξ (t) 3,5 & ξ (t) 4,1 ξ (t) 4,2 ξ (t) 4, 3 ξ (t) 4,2 ξ (t) 4,3 ξ (t) 4,4 ξ (t) 4, 3 ξ (t) 4,4 ξ (t) 4,5 & ξ (t) 3,1 ξ (t) 3,2 ξ (t) 3,3 ξ (t) 3,2 ξ (t) 3,3 ξ (t) 3, 4 ξ (t) 3,3 ξ (t) 3,4 ξ (t) 3,5 & ξ (t) 4,1 ξ (t) 4,2 ξ (t) 4, 3 ξ (t) 4,2 ξ (t) 4, 3 ξ (t) 4,4 ξ (t) 4,3 & ξ (t) 4, 4 ξ (t) 4, 5 & ξ (t) 5,1ξ (t) 5,2 ξ (t) 5,3 ξ (t) 5, 2 ξ (t) 5,3 ξ (t) 5,4 ξ (t) 5,3 ξ (t) 5, 4 ξ (t) 5,5 After an exhaustive updating of all the remaining six possible sites (3,2), (3,3),(3,4),(4,2),(4,3) and (4,4) in P, in this manner, we have : ) ξ (t+1) 2, 2 ξ (t+1) 2,3 ξ (t+1) 2, 4 &&& ξ (t+1) 3,2 ξ (t+1) 3,3 ξ (t+1) 3, 4 &&& ξ (t+1) 4,2 & ξ (t+1) 4, 3 ξ (t+1) 4,4. We see that a new 3X3 square array configuration evolves as shown below, ξ (t+1) 2, 2 ξ (t) 2,3 ξ (t) 2, 4 ξ (t+1) 3,2 ξ (t+1) 3,3 ξ (t+1) 3, 4 ξ (t+1) 4,2 ξ (t+1) 4, 3 ξ (t+1) 4,4 as the result of applying a local rule just once to all the nine possible site values in the 5x5 square array configuration. Lastly, as we have done in the case of one-dimensional cellular automata, we flank with the symbol 0 all the four sides of the newly evolved 3x3 square array configuration in order to maintain its array size. The resulting pattern would appear as shown below: The above argument is valid for the normal algorithmic realization of any N-ary valued five or nine-neighborhood two-dimensional cellular automaton. The proof ends. In what follows, we construct a normal algorithm N 21rCA for realizing a binary valued, r-neighborhood (r=5 or 9), two dimensional cellular automata. We need the following alphabets: Alphabet of terminals: A = { 0 1 } Alphabet of nonterminals: E = { α β Γ σ } Alphabet of delimiters: D 1 = { ) }, D 2 = { & } Site variables are denoted by ξ, η, μ and φ, and they take on values from A. The variable ζ ranges over the union of the alphabets A and D 2. The symbols and denote the left and the right parentheses respectively. The scheme of N 21rCA given below is constructed over the union of the alphabets A, E, D 1, and D 2 [2], [4]. N 21rCA is a composition of four normal algorithms N 1, N 2, N 3 and N 4.

5 A five neighborhood cellular automaton, as we have seen already, evolves according to a rule φ, where, for any site (i,j) we have: ξ (t+1) i, j = φ [ξ (t) i, j, ξ (t) i, j+1, ξ (t) i+1, j, ξ (t) i, j-1, ξ (t) i-1, j ]. Similarly, a nine-neighborhood cellular automaton evolves according to a rule φ, where, for any site (i, j) the following holds : ξ (t+1) i, j = φ [ ξ (t) i, j, ξ (t) i, j+1, ξ (t) i+1, j+1, ξ (t) i+1, j, ξ (t) i+1, j-1, ξ (t) i, j-1, ξ (t) i-1, j-1, ξ (t) i-1, j, ξ (t) i-1, j+1 ]. A five-neighborhood 5-tuple, ξ (t) i, j, ξ (t) i, j+1, ξ (t) i+1, j, ξ (t) i, j-1, ξ (t) i-1, j holds 2 5 possible combinations of symbols from the alphabet A. An updating rule φ in this case, is a system of 32 substitution formulas with their left parts consisting of the eight words of length 5 from A and their right parts consisting of single letters from A. If we arrange all the thirty two words as per the increasing order of their numerical counterparts, then we code a rule φ as a word L of length 32 from the alphabet A. In fact, one can generate 2 32 updating rules. This involves certain logical premise [1], [3]. In the same manner, a nine-neighborhood 9-tuple: ξ (t) i, j, ξ (t) i, j+1, ξ (t) i+1, j+1, ξ (t) i+1, j, ξ (t) i+1, j-1, ξ (t) i, j-1, ξ (t) i-1, j-1, ξ (t) i-1, j, ξ (t) i-1, j+1 holds 2 9 possible combinations of symbols from the alphabet A. An updating rule φ in this case, in a system of 512 substitution formulas with their left parts consisting of the 512 words of length 9 from A and their right parts consisting of single letters from A. If we arrange all the 512 words as per the increasing order of their numerical counterparts, then we can code a rule φ as a word L of length 512 from the alphabet A. In fact, one can generate updating rules. Example 2 Let us consider the following binary valued square array configuration of width NSIZE = 5, of a two-dimensional cellular automaton, at a time step t : and apply the five-neighborhood rule φ to it. The code word L corresponding to this rule is: The one-dimensional string corresponding to this square array configuration is P = )01100&01010&00100&00110& N 1 : )01100&01010&00100&00110&01000 )α01100&01010&00100&00110&01000 )0α1100&01010&00100&00110&01000 )01α100&01010&00100&00110&01000 )011α00&01010&00100&00110&01000 )011110α0&01010&00100&00110&01000 ) α&01010&00100&00110&01000 ) &α01010&00100&00110&01000 ) &0α1010&00100&00110&01000 ) &01α010&00100&00110&01000 ) &010α10&00100&00110&01000 ) &010101α0&00100&00110&01000 ) & α&00100&00110&01000 ) & &α00100&00110&01000 ) & &0α0100&00110&01000 ) & &00α100&00110&01000 ) & &001α00&00110&01000 ) & &001010α0&00110&01000 ) & & α& 00110& σα&00110& σ&α00110& σ&0α0110& σ&00α110& σ&001α10& σ&001011α0& σ& α& & α& & α& & σα&01000

6 σ&α σ&0α σ&01α σ&010α σ&010100α σ&α &α & N 2 : & )αβγ & & & & & & & & )α &βγ & & & & & & & )α &β &γ & & & & & & )1α110100&β101010&Γ010100& & & )10α100&β010&Γ100& & & & & & )101α&β&Γ& & & & & & )1010&0αβΓ & & & & & )1010&0α &βΓ & & & & )1010&0α &β &Γ & & & )1010&01α101010&β010100&Γ011110& & & )1010&010α010&β100&Γ110& & & )1010&0101α&β&Γ& & & )1010&01010&0αβΓ & & )1010&01010&0α &βΓ & )1010&01010&0α &β & Γ )1010&01010&01α010100&β011110&Γ )1010&01010&010α100&β110&Γ000 )1010&01010&0101α&β&Γ )1010&01010&01010&00000 N 3 : )1010&01010&01010&00000 )00000&01010&01010&01010&00000 N 4 : )00000&01010&01010&01010& The new square array configuration that has evolved now is shown below: One can construct three dimensional normal algorithmic cellular automata based on the details discussed here. REFERENCES [1] Barwise, Jon, Handbook of Mathematical Logic, North-Holland Publishing company, [2] Beeson, M. J., Foundations of Constructive Mathematics, Springer Verlag, Heidelberg, [3] Bishop, Errett, Foundations of Constructive Analysis, McGraw Hill, [4] Bridges, D. S., Constructive Functional Analysis, Pitman, London, [5] Kushner, B. K., Lectures on Constructive Mathematical Analysis, AMS, providence, Phode Island, Vol 60, [6] Lothaire, M., Combinatorics on Words, Addison Wesley Pub. Co., [7] Markov, A. A., Theory of Algorithms, The Israel Program for Scientific Translations, 1961.Electronic Publication: [8] Wolfram, Stephen, Theory and Applications of Cellular Automata, World Scientific Publishing Company, [9] Markov, A. A., Normal Algorithms which Compute Boolean Functions, Soviet Math. Dokl, 5, [10] Rajan, E. G., Cellular Logic Array Processing, Techniques for high throughput Image Processing Systems, SADHANA, Special Issue on Computer Vision, Volume 18, Part 2, June 1993, pp , Indian Academy of Sciences. [11] Rajan, E.G., and Sinha, V. P., Image Processing using Normal Algorithmic Cellular Automata, Technical Report, TR/IP-4-91, Department of Electrical Engineering, Indian Institute of Technology, Kanpur, January, [12] Rajan E.G., High-Throughput Cellular Logic Array Processing of Remote Sensed Imageries, International Conference on Remote Sensing and GIS, ICORG-92, Jawaharlal Nehru Technological University, Hyderabad, 1992, Proceedings, Tata McGraw Hill Publishing Company Pvt. Ltd., pp

Application of Two-dimensional Periodic Cellular Automata in Image Processing

Application of Two-dimensional Periodic Cellular Automata in Image Processing International Journal of Computer, Mathematical Sciences and Applications Serials Publications Vol. 5, No. 1-2, January-June 2011, pp. 49 55 ISSN: 0973-6786 Application of Two-dimensional Periodic Cellular

More information

Cellular logic array processing techniques for high-throughput image processing systems

Cellular logic array processing techniques for high-throughput image processing systems S~dhan& Vol. 18, Part 2, June 1993, pp. 279-300. Printed in India. Cellular logic array processing techniques for high-throughput image processing systems E G RAJAN Department of Electrical Engineering,

More information

Cellular Automata. Cellular Automata contains three modes: 1. One Dimensional, 2. Two Dimensional, and 3. Life

Cellular Automata. Cellular Automata contains three modes: 1. One Dimensional, 2. Two Dimensional, and 3. Life Cellular Automata Cellular Automata is a program that explores the dynamics of cellular automata. As described in Chapter 9 of Peak and Frame, a cellular automaton is determined by four features: The state

More information

Graph Adjacency Matrix Automata Joshua Abbott, Phyllis Z. Chinn, Tyler Evans, Allen J. Stewart Humboldt State University, Arcata, California

Graph Adjacency Matrix Automata Joshua Abbott, Phyllis Z. Chinn, Tyler Evans, Allen J. Stewart Humboldt State University, Arcata, California Graph Adjacency Matrix Automata Joshua Abbott, Phyllis Z. Chinn, Tyler Evans, Allen J. Stewart Humboldt State University, Arcata, California Abstract We define a graph adjacency matrix automaton (GAMA)

More information

Cellular Automata. Nicholas Geis. January 22, 2015

Cellular Automata. Nicholas Geis. January 22, 2015 Cellular Automata Nicholas Geis January 22, 2015 In Stephen Wolfram s book, A New Kind of Science, he postulates that the world as we know it and all its complexities is just a simple Sequential Dynamical

More information

UNIT 9C Randomness in Computation: Cellular Automata Principles of Computing, Carnegie Mellon University

UNIT 9C Randomness in Computation: Cellular Automata Principles of Computing, Carnegie Mellon University UNIT 9C Randomness in Computation: Cellular Automata 1 Exam locations: Announcements 2:30 Exam: Sections A, B, C, D, E go to Rashid (GHC 4401) Sections F, G go to PH 125C. 3:30 Exam: All sections go to

More information

Generalized Coordinates for Cellular Automata Grids

Generalized Coordinates for Cellular Automata Grids Generalized Coordinates for Cellular Automata Grids Lev Naumov Saint-Peterburg State Institute of Fine Mechanics and Optics, Computer Science Department, 197101 Sablinskaya st. 14, Saint-Peterburg, Russia

More information

Two-dimensional Totalistic Code 52

Two-dimensional Totalistic Code 52 Two-dimensional Totalistic Code 52 Todd Rowland Senior Research Associate, Wolfram Research, Inc. 100 Trade Center Drive, Champaign, IL The totalistic two-dimensional cellular automaton code 52 is capable

More information

Automatic Classification of One-Dimensional Cellular Automata

Automatic Classification of One-Dimensional Cellular Automata Automatic Classification of One-Dimensional Cellular Automata Rochester Institute of Technology Computer Science Department Master of Science Thesis Daniel R. Kunkle July 17, 2003 Advisor: Roger S. Gaborski

More information

Adaptive edge detection via image statistic features and hybrid model of fuzzy cellular automata and cellular learning automata

Adaptive edge detection via image statistic features and hybrid model of fuzzy cellular automata and cellular learning automata 2009 International Conference on Information and Multimedia Technology Adaptive edge detection via image statistic features and hybrid model of fuzzy cellular automata and cellular learning automata R.Enayatifar

More information

Robots & Cellular Automata

Robots & Cellular Automata Integrated Seminar: Intelligent Robotics Robots & Cellular Automata Julius Mayer Table of Contents Cellular Automata Introduction Update Rule 3 4 Neighborhood 5 Examples. 6 Robots Cellular Neural Network

More information

Platform Color Designs for Interactive Molecular Arrangements

Platform Color Designs for Interactive Molecular Arrangements Platform Color Designs for Interactive Molecular Arrangements Jasper Braun, Daniel Cruz, and Nataša Jonoska University of South Florida dcruz@mail.usf.edu June 5, 2017 1 / 23 Overview 1 Simulation of Cellular

More information

COMPUTER SIMULATION OF COMPLEX SYSTEMS USING AUTOMATA NETWORKS K. Ming Leung

COMPUTER SIMULATION OF COMPLEX SYSTEMS USING AUTOMATA NETWORKS K. Ming Leung POLYTECHNIC UNIVERSITY Department of Computer and Information Science COMPUTER SIMULATION OF COMPLEX SYSTEMS USING AUTOMATA NETWORKS K. Ming Leung Abstract: Computer simulation of the dynamics of complex

More information

ALGORITHMS FOR GENERATING CONVEX POLYHEDRONS OVER THREE DIMENSIONAL RECTANGULAR GRID

ALGORITHMS FOR GENERATING CONVEX POLYHEDRONS OVER THREE DIMENSIONAL RECTANGULAR GRID ALGORITHMS FOR GENERATING CONVEX POLYHEDRONS OVER THREE DIMENSIONAL RECTANGULAR GRID G. Ramesh Chandra 1 and E.G. Rajan 2 1 Associate Professor, Department of Computer Engineering, V.N.R. Vignana Jyothi

More information

What are Cellular Automata?

What are Cellular Automata? What are Cellular Automata? It is a model that can be used to show how the elements of a system interact with each other. Each element of the system is assigned a cell. The cells can be 2-dimensional squares,

More information

Uniform edge-c-colorings of the Archimedean Tilings

Uniform edge-c-colorings of the Archimedean Tilings Discrete & Computational Geometry manuscript No. (will be inserted by the editor) Uniform edge-c-colorings of the Archimedean Tilings Laura Asaro John Hyde Melanie Jensen Casey Mann Tyler Schroeder Received:

More information

Light Weight Cellular Automata Computations and Symmetric Key for Achieving Efficient Cryptography

Light Weight Cellular Automata Computations and Symmetric Key for Achieving Efficient Cryptography International Journal of Emerging Engineering Research and Technology Volume 3, Issue 12, December 2015, PP 84-91 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) Light Weight Cellular Automata Computations

More information

MRF Based LSB Steganalysis: A New Measure of Steganography Capacity

MRF Based LSB Steganalysis: A New Measure of Steganography Capacity MRF Based LSB Steganalysis: A New Measure of Steganography Capacity Debasis Mazumdar 1, Apurba Das 1, and Sankar K. Pal 2 1 CDAC, Kolkata, Salt Lake Electronics Complex, Kolkata, India {debasis.mazumdar,apurba.das}@cdackolkata.in

More information

A Closed Asynchronous Dynamic Model of Cellular Learning Automata and its Application to Peer-to-Peer Networks

A Closed Asynchronous Dynamic Model of Cellular Learning Automata and its Application to Peer-to-Peer Networks A Closed Asynchronous Dynamic Model of Cellular Learning Automata and its Application to Peer-to-Peer Networks Ali Mohammad Saghiri *, Mohammad Reza Meybodi Soft Computing Laboratory, Computer Engineering

More information

for (i=1; i<=100000; i++) { x = sqrt (y); // square root function cout << x+i << endl; }

for (i=1; i<=100000; i++) { x = sqrt (y); // square root function cout << x+i << endl; } Ex: The difference between Compiler and Interpreter The interpreter actually carries out the computations specified in the source program. In other words, the output of a compiler is a program, whereas

More information

Application of Totalistic Cellular Automata for Noise Filtering in Image Processing

Application of Totalistic Cellular Automata for Noise Filtering in Image Processing Journal of Cellular Automata, Vol. 7, pp. 207 221 Reprints available directly from the publisher Photocopying permitted by license only 2012 Old City Publishing, Inc. Published by license under the OCP

More information

Netaji Subhash Engineering College, Technocity, Garia, Kolkata , India

Netaji Subhash Engineering College, Technocity, Garia, Kolkata , India Classification of Cellular Automata Rules Based on Their Properties Pabitra Pal Choudhury 1, Sudhakar Sahoo 2, Sarif Hasssan 3, Satrajit Basu 4, Dibyendu Ghosh 5, Debarun Kar 6, Abhishek Ghosh 7, Avijit

More information

Weighted Neighborhood Sequences in Non-Standard Three-Dimensional Grids Parameter Optimization

Weighted Neighborhood Sequences in Non-Standard Three-Dimensional Grids Parameter Optimization Weighted Neighborhood Sequences in Non-Standard Three-Dimensional Grids Parameter Optimization Robin Strand and Benedek Nagy Centre for Image Analysis, Uppsala University, Box 337, SE-7505 Uppsala, Sweden

More information

Image processing. Reading. What is an image? Brian Curless CSE 457 Spring 2017

Image processing. Reading. What is an image? Brian Curless CSE 457 Spring 2017 Reading Jain, Kasturi, Schunck, Machine Vision. McGraw-Hill, 1995. Sections 4.2-4.4, 4.5(intro), 4.5.5, 4.5.6, 5.1-5.4. [online handout] Image processing Brian Curless CSE 457 Spring 2017 1 2 What is an

More information

Theory of Computation Prof. Raghunath Tewari Department of Computer Science and Engineering Indian Institute of Technology, Kanpur

Theory of Computation Prof. Raghunath Tewari Department of Computer Science and Engineering Indian Institute of Technology, Kanpur Theory of Computation Prof. Raghunath Tewari Department of Computer Science and Engineering Indian Institute of Technology, Kanpur Lecture 01 Introduction to Finite Automata Welcome everybody. This is

More information

for (i=1; i<=100000; i++) { x = sqrt (y); // square root function cout << x+i << endl; }

for (i=1; i<=100000; i++) { x = sqrt (y); // square root function cout << x+i << endl; } Ex: The difference between Compiler and Interpreter The interpreter actually carries out the computations specified in the source program. In other words, the output of a compiler is a program, whereas

More information

Two-dimensional Four Color Cellular Automaton: Surface Explorations

Two-dimensional Four Color Cellular Automaton: Surface Explorations Two-dimensional Four Color Cellular Automaton: Surface Explorations Robert H. Barbour School of Computing and Information Systems, Unitec New Zealand, Carrington Road, Mount Albert, Auckland, New Zealand

More information

AN INSIGHT INTO CELLULAR AUTOMATA-BASED IMPULSE NOISE FILTRATION ALGORITHMS

AN INSIGHT INTO CELLULAR AUTOMATA-BASED IMPULSE NOISE FILTRATION ALGORITHMS AN INSIGHT INTO CELLULAR AUTOMATA-BASED IMPULSE NOISE FILTRATION ALGORITHMS Zubair Jeelani 1, Fasel Qadir 2 1 Department of Computer Science, University of Kashmir, India 2 Department of Computer Science,

More information

Cellular Learning Automata-Based Color Image Segmentation using Adaptive Chains

Cellular Learning Automata-Based Color Image Segmentation using Adaptive Chains Cellular Learning Automata-Based Color Image Segmentation using Adaptive Chains Ahmad Ali Abin, Mehran Fotouhi, Shohreh Kasaei, Senior Member, IEEE Sharif University of Technology, Tehran, Iran abin@ce.sharif.edu,

More information

A Cellular Automata based Optimal Edge Detection Technique using Twenty-Five Neighborhood Model

A Cellular Automata based Optimal Edge Detection Technique using Twenty-Five Neighborhood Model A Cellular Automata based Optimal Edge Detection Technique using Twenty-Five Neighborhood Model Deepak Ranjan Nayak Dept. of CSE, College of Engineering and Technology Bhubaneswar, Odisha India-751003

More information

Chapter 11 :: Functional Languages

Chapter 11 :: Functional Languages Chapter 11 :: Functional Languages Programming Language Pragmatics Michael L. Scott Copyright 2016 Elsevier 1 Chapter11_Functional_Languages_4e - Tue November 21, 2017 Historical Origins The imperative

More information

CHAPTER 2 TEXTURE CLASSIFICATION METHODS GRAY LEVEL CO-OCCURRENCE MATRIX AND TEXTURE UNIT

CHAPTER 2 TEXTURE CLASSIFICATION METHODS GRAY LEVEL CO-OCCURRENCE MATRIX AND TEXTURE UNIT CHAPTER 2 TEXTURE CLASSIFICATION METHODS GRAY LEVEL CO-OCCURRENCE MATRIX AND TEXTURE UNIT 2.1 BRIEF OUTLINE The classification of digital imagery is to extract useful thematic information which is one

More information

Complexity and Universality of Iterated Finite Automata

Complexity and Universality of Iterated Finite Automata Complexity and Universality of Iterated Finite Automata Jiang Zhang Complex Systems Research Center Academy of Mathematics and Systems Science Chinese Academy of Sciences No. 55 Zhong Guan Cun Dong Lu

More information

A New Encryption and Decryption Algorithm for Block Cipher Using Cellular Automata Rules

A New Encryption and Decryption Algorithm for Block Cipher Using Cellular Automata Rules International Journal of Emerging Engineering Research and Technology Volume 3, Issue 8, August 2015, PP 130-136 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) A New Encryption and Decryption Algorithm

More information

Programming Lecture 3

Programming Lecture 3 Programming Lecture 3 Expressions (Chapter 3) Primitive types Aside: Context Free Grammars Constants, variables Identifiers Variable declarations Arithmetic expressions Operator precedence Assignment statements

More information

Lecture 4: Image Processing

Lecture 4: Image Processing Lecture 4: Image Processing Definitions Many graphics techniques that operate only on images Image processing: operations that take images as input, produce images as output In its most general form, an

More information

Edge and local feature detection - 2. Importance of edge detection in computer vision

Edge and local feature detection - 2. Importance of edge detection in computer vision Edge and local feature detection Gradient based edge detection Edge detection by function fitting Second derivative edge detectors Edge linking and the construction of the chain graph Edge and local feature

More information

Topology Proceedings. COPYRIGHT c by Topology Proceedings. All rights reserved.

Topology Proceedings. COPYRIGHT c by Topology Proceedings. All rights reserved. Topology Proceedings Web: http://topology.auburn.edu/tp/ Mail: Topology Proceedings Department of Mathematics & Statistics Auburn University, Alabama 36849, USA E-mail: topolog@auburn.edu ISSN: 0146-4124

More information

Thompson groups, Cantor space, and foldings of de Bruijn graphs. Peter J. Cameron University of St Andrews

Thompson groups, Cantor space, and foldings of de Bruijn graphs. Peter J. Cameron University of St Andrews Thompson groups, Cantor space, and foldings of de Bruijn graphs Peter J Cameron University of St Andrews Breaking the boundaries University of Sussex April 25 The 97s Three groups I was born (in Paul Erdős

More information

Structural and Syntactic Pattern Recognition

Structural and Syntactic Pattern Recognition Structural and Syntactic Pattern Recognition Selim Aksoy Department of Computer Engineering Bilkent University saksoy@cs.bilkent.edu.tr CS 551, Fall 2017 CS 551, Fall 2017 c 2017, Selim Aksoy (Bilkent

More information

CELLULAR AUTOMATA IN MATHEMATICAL MODELING JOSH KANTOR. 1. History

CELLULAR AUTOMATA IN MATHEMATICAL MODELING JOSH KANTOR. 1. History CELLULAR AUTOMATA IN MATHEMATICAL MODELING JOSH KANTOR 1. History Cellular automata were initially conceived of in 1948 by John von Neumann who was searching for ways of modeling evolution. He was trying

More information

Introduction to Digital Image Processing

Introduction to Digital Image Processing Fall 2005 Image Enhancement in the Spatial Domain: Histograms, Arithmetic/Logic Operators, Basics of Spatial Filtering, Smoothing Spatial Filters Tuesday, February 7 2006, Overview (1): Before We Begin

More information

Complex Dynamics in Life-like Rules Described with de Bruijn Diagrams: Complex and Chaotic Cellular Automata

Complex Dynamics in Life-like Rules Described with de Bruijn Diagrams: Complex and Chaotic Cellular Automata Complex Dynamics in Life-like Rules Described with de Bruijn Diagrams: Complex and Chaotic Cellular Automata Paulina A. León Centro de Investigación y de Estudios Avanzados Instituto Politécnico Nacional

More information

Basic relations between pixels (Chapter 2)

Basic relations between pixels (Chapter 2) Basic relations between pixels (Chapter 2) Lecture 3 Basic Relationships Between Pixels Definitions: f(x,y): digital image Pixels: q, p (p,q f) A subset of pixels of f(x,y): S A typology of relations:

More information

CELLULAR automata (CA) are mathematical models for

CELLULAR automata (CA) are mathematical models for 1 Cellular Learning Automata with Multiple Learning Automata in Each Cell and its Applications Hamid Beigy and M R Meybodi Abstract The cellular learning automata, which is a combination of cellular automata

More information

Formal languages and computation models

Formal languages and computation models Formal languages and computation models Guy Perrier Bibliography John E. Hopcroft, Rajeev Motwani, Jeffrey D. Ullman - Introduction to Automata Theory, Languages, and Computation - Addison Wesley, 2006.

More information

Drawdown Automata, Part 1: Basic Concepts

Drawdown Automata, Part 1: Basic Concepts Drawdown Automata, Part 1: Basic Concepts Cellular Automata A cellular automaton is an array of identical, interacting cells. There are many possible geometries for cellular automata; the most commonly

More information

Image Segmentation Using Cellular Automata: A Technical Survey

Image Segmentation Using Cellular Automata: A Technical Survey www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 4 April, 2013 Page No. 1268-1272 Image Segmentation Using Cellular Automata: A Technical Survey Priyanka

More information

FAdo: Interactive Tools for Learning Formal Computational Models

FAdo: Interactive Tools for Learning Formal Computational Models FAdo: Interactive Tools for Learning Formal Computational Models Rogério Reis Nelma Moreira DCC-FC& LIACC, Universidade do Porto R. do Campo Alegre 823, 4150 Porto, Portugal {rvr,nam}@ncc.up.pt Abstract

More information

Math 170- Graph Theory Notes

Math 170- Graph Theory Notes 1 Math 170- Graph Theory Notes Michael Levet December 3, 2018 Notation: Let n be a positive integer. Denote [n] to be the set {1, 2,..., n}. So for example, [3] = {1, 2, 3}. To quote Bud Brown, Graph theory

More information

New method for edge detection and de noising via fuzzy cellular automata

New method for edge detection and de noising via fuzzy cellular automata International Journal of Physical Sciences Vol. 6(13), pp. 3175-3180, 4 July, 2011 Available online at http://www.academicjournals.org/ijps DOI: 10.5897/IJPS11.047 ISSN 1992-1950 2011 Academic Journals

More information

Texture Image Segmentation using FCM

Texture Image Segmentation using FCM Proceedings of 2012 4th International Conference on Machine Learning and Computing IPCSIT vol. 25 (2012) (2012) IACSIT Press, Singapore Texture Image Segmentation using FCM Kanchan S. Deshmukh + M.G.M

More information

Testing Isomorphism of Strongly Regular Graphs

Testing Isomorphism of Strongly Regular Graphs Spectral Graph Theory Lecture 9 Testing Isomorphism of Strongly Regular Graphs Daniel A. Spielman September 26, 2018 9.1 Introduction In the last lecture we saw how to test isomorphism of graphs in which

More information

Chapter 10 Image Segmentation. Yinghua He

Chapter 10 Image Segmentation. Yinghua He Chapter 10 Image Segmentation Yinghua He The whole is equal to the sum of its parts. -Euclid The whole is greater than the sum of its parts. -Max Wertheimer The Whole is Not Equal to the Sum of Its Parts:

More information

MODELS OF CUBIC THEORIES

MODELS OF CUBIC THEORIES Bulletin of the Section of Logic Volume 43:1/2 (2014), pp. 19 34 Sergey Sudoplatov MODELS OF CUBIC THEORIES Abstract Cubic structures and cubic theories are defined on a base of multidimensional cubes.

More information

Edge Detection Method based on Cellular Automata

Edge Detection Method based on Cellular Automata Edge Detection Method based on Cellular Automata [1] Jyoti Swarup, [] Dr. Indu S [1] Dept. of Computer Science and Engineering, [] Dept. of Electronics & Communication Engineering, Delhi Technological

More information

Digital Image Fundamentals II

Digital Image Fundamentals II Digital Image Fundamentals II 1. Image modeling and representations 2. Pixels and Pixel relations 3. Arithmetic operations of images 4. Image geometry operation 5. Image processing with Matlab - Image

More information

Associative Cellular Learning Automata and its Applications

Associative Cellular Learning Automata and its Applications Associative Cellular Learning Automata and its Applications Meysam Ahangaran and Nasrin Taghizadeh and Hamid Beigy Department of Computer Engineering, Sharif University of Technology, Tehran, Iran ahangaran@iust.ac.ir,

More information

SIMULATION OF ARTIFICIAL SYSTEMS BEHAVIOR IN PARAMETRIC EIGHT-DIMENSIONAL SPACE

SIMULATION OF ARTIFICIAL SYSTEMS BEHAVIOR IN PARAMETRIC EIGHT-DIMENSIONAL SPACE 78 Proceedings of the 4 th International Conference on Informatics and Information Technology SIMULATION OF ARTIFICIAL SYSTEMS BEHAVIOR IN PARAMETRIC EIGHT-DIMENSIONAL SPACE D. Ulbikiene, J. Ulbikas, K.

More information

Generating edge covers of path graphs

Generating edge covers of path graphs Generating edge covers of path graphs J. Raymundo Marcial-Romero, J. A. Hernández, Vianney Muñoz-Jiménez and Héctor A. Montes-Venegas Facultad de Ingeniería, Universidad Autónoma del Estado de México,

More information

Reducing Clocks in Timed Automata while Preserving Bisimulation

Reducing Clocks in Timed Automata while Preserving Bisimulation Reducing Clocks in Timed Automata while Preserving Bisimulation Shibashis Guha Chinmay Narayan S. Arun-Kumar Indian Institute of Technology Delhi {shibashis, chinmay, sak}@cse.iitd.ac.in arxiv:1404.6613v2

More information

Topos Theory. Lectures 3-4: Categorical preliminaries II. Olivia Caramello. Topos Theory. Olivia Caramello. Basic categorical constructions

Topos Theory. Lectures 3-4: Categorical preliminaries II. Olivia Caramello. Topos Theory. Olivia Caramello. Basic categorical constructions Lectures 3-4: Categorical preliminaries II 2 / 17 Functor categories Definition Let C and D be two categories. The functor category [C,D] is the category having as objects the functors C D and as arrows

More information

The Edge Slide Graph of the 3-cube

The Edge Slide Graph of the 3-cube Rose-Hulman Undergraduate Mathematics Journal Volume 12 Issue 2 Article 6 The Edge Slide Graph of the 3-cube Lyndal Henden Massey University, Palmerston North, New Zealand, lyndal_henden@hotmail.com Follow

More information

This is already grossly inconvenient in present formalisms. Why do we want to make this convenient? GENERAL GOALS

This is already grossly inconvenient in present formalisms. Why do we want to make this convenient? GENERAL GOALS 1 THE FORMALIZATION OF MATHEMATICS by Harvey M. Friedman Ohio State University Department of Mathematics friedman@math.ohio-state.edu www.math.ohio-state.edu/~friedman/ May 21, 1997 Can mathematics be

More information

Topological space - Wikipedia, the free encyclopedia

Topological space - Wikipedia, the free encyclopedia Page 1 of 6 Topological space From Wikipedia, the free encyclopedia Topological spaces are mathematical structures that allow the formal definition of concepts such as convergence, connectedness, and continuity.

More information

MT5821 Advanced Combinatorics

MT5821 Advanced Combinatorics MT5821 Advanced Combinatorics 4 Graph colouring and symmetry There are two colourings of a 4-cycle with two colours (red and blue): one pair of opposite vertices should be red, the other pair blue. There

More information

Conway s Game of Life Wang An Aloysius & Koh Shang Hui

Conway s Game of Life Wang An Aloysius & Koh Shang Hui Wang An Aloysius & Koh Shang Hui Winner of Foo Kean Pew Memorial Prize and Gold Award Singapore Mathematics Project Festival 2014 Abstract Conway s Game of Life is a cellular automaton devised by the British

More information

Homology cycle bases from acyclic matchings

Homology cycle bases from acyclic matchings Homology cycle bases from acyclic matchings Dmitry Feichtner-Kozlov University of Bremen Kyoto Workshop, January 019 What is... Applied Topology? studying global features of shapes applications in other

More information

Handout 9: Imperative Programs and State

Handout 9: Imperative Programs and State 06-02552 Princ. of Progr. Languages (and Extended ) The University of Birmingham Spring Semester 2016-17 School of Computer Science c Uday Reddy2016-17 Handout 9: Imperative Programs and State Imperative

More information

7. The Gauss-Bonnet theorem

7. The Gauss-Bonnet theorem 7. The Gauss-Bonnet theorem 7.1 Hyperbolic polygons In Euclidean geometry, an n-sided polygon is a subset of the Euclidean plane bounded by n straight lines. Thus the edges of a Euclidean polygon are formed

More information

Topological Invariance under Line Graph Transformations

Topological Invariance under Line Graph Transformations Symmetry 2012, 4, 329-335; doi:103390/sym4020329 Article OPEN ACCESS symmetry ISSN 2073-8994 wwwmdpicom/journal/symmetry Topological Invariance under Line Graph Transformations Allen D Parks Electromagnetic

More information

GiRaF: a toolbox for Gibbs Random Fields analysis

GiRaF: a toolbox for Gibbs Random Fields analysis GiRaF: a toolbox for Gibbs Random Fields analysis Julien Stoehr *1, Pierre Pudlo 2, and Nial Friel 1 1 University College Dublin 2 Aix-Marseille Université February 24, 2016 Abstract GiRaF package offers

More information

Languages and Compilers

Languages and Compilers Principles of Software Engineering and Operational Systems Languages and Compilers SDAGE: Level I 2012-13 3. Formal Languages, Grammars and Automata Dr Valery Adzhiev vadzhiev@bournemouth.ac.uk Office:

More information

Last lecture CMSC330. This lecture. Finite Automata: States. Finite Automata. Implementing Regular Expressions. Languages. Regular expressions

Last lecture CMSC330. This lecture. Finite Automata: States. Finite Automata. Implementing Regular Expressions. Languages. Regular expressions Last lecture CMSC330 Finite Automata Languages Sets of strings Operations on languages Regular expressions Constants Operators Precedence 1 2 Finite automata States Transitions Examples Types This lecture

More information

Definition: A context-free grammar (CFG) is a 4- tuple. variables = nonterminals, terminals, rules = productions,,

Definition: A context-free grammar (CFG) is a 4- tuple. variables = nonterminals, terminals, rules = productions,, CMPSCI 601: Recall From Last Time Lecture 5 Definition: A context-free grammar (CFG) is a 4- tuple, variables = nonterminals, terminals, rules = productions,,, are all finite. 1 ( ) $ Pumping Lemma for

More information

On Sequential Topogenic Graphs

On Sequential Topogenic Graphs Int. J. Contemp. Math. Sciences, Vol. 5, 2010, no. 36, 1799-1805 On Sequential Topogenic Graphs Bindhu K. Thomas, K. A. Germina and Jisha Elizabath Joy Research Center & PG Department of Mathematics Mary

More information

arxiv: v1 [math.co] 20 Nov 2013

arxiv: v1 [math.co] 20 Nov 2013 HOMOGENEOUS 2-PARTITE DIGRAPHS arxiv:1311.5056v1 [math.co] 20 Nov 2013 MATTHIAS HAMANN Abstract. We call a 2-partite digraph D homogeneous if every isomorphism between finite induced subdigraphs that respects

More information

Unlabeled equivalence for matroids representable over finite fields

Unlabeled equivalence for matroids representable over finite fields Unlabeled equivalence for matroids representable over finite fields November 16, 2012 S. R. Kingan Department of Mathematics Brooklyn College, City University of New York 2900 Bedford Avenue Brooklyn,

More information

A Combined Encryption Compression Scheme Using Chaotic Maps

A Combined Encryption Compression Scheme Using Chaotic Maps BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 13, No 2 Sofia 2013 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.2478/cait-2013-0016 A Combined Encryption Compression

More information

NP versus PSPACE. Frank Vega. To cite this version: HAL Id: hal https://hal.archives-ouvertes.fr/hal

NP versus PSPACE. Frank Vega. To cite this version: HAL Id: hal https://hal.archives-ouvertes.fr/hal NP versus PSPACE Frank Vega To cite this version: Frank Vega. NP versus PSPACE. Preprint submitted to Theoretical Computer Science 2015. 2015. HAL Id: hal-01196489 https://hal.archives-ouvertes.fr/hal-01196489

More information

On the Component Number of Links from Plane Graphs

On the Component Number of Links from Plane Graphs On the Component Number of Links from Plane Graphs Daniel S. Silver Susan G. Williams January 20, 2015 Abstract A short, elementary proof is given of the result that the number of components of a link

More information

Filters. Advanced and Special Topics: Filters. Filters

Filters. Advanced and Special Topics: Filters. Filters Filters Advanced and Special Topics: Filters Dr. Edmund Lam Department of Electrical and Electronic Engineering The University of Hong Kong ELEC4245: Digital Image Processing (Second Semester, 2016 17)

More information

International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 1, Jan-Feb 2015

International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 1, Jan-Feb 2015 RESEARCH ARTICLE Comparison between Square Pixel Structure and Hexagonal Pixel Structure in Digital Image Processing Illa Singh 1, Ashish Oberoi 2 M.Tech 1, Final Year Student, Associate Professor2 Department

More information

An Efficient Transformation for Klee s Measure Problem in the Streaming Model Abstract Given a stream of rectangles over a discrete space, we consider the problem of computing the total number of distinct

More information

Coarse-to-fine image registration

Coarse-to-fine image registration Today we will look at a few important topics in scale space in computer vision, in particular, coarseto-fine approaches, and the SIFT feature descriptor. I will present only the main ideas here to give

More information

Discrete Optimization. Lecture Notes 2

Discrete Optimization. Lecture Notes 2 Discrete Optimization. Lecture Notes 2 Disjunctive Constraints Defining variables and formulating linear constraints can be straightforward or more sophisticated, depending on the problem structure. The

More information

Memory in Media with Manufacturing Faults

Memory in Media with Manufacturing Faults Memory in Media with Manufacturing Faults Mark A. McCann A Dissertation Presented to the Faculty of Princeton University in Candidacy for the Degree of Doctor of Philosophy Recommended for Acceptance By

More information

A New Statistical Restoration Method for Spatial Domain Images

A New Statistical Restoration Method for Spatial Domain Images A New Statistical Restoration Method for Spatial Domain Images Arijit Sur 1,,PiyushGoel 2, and Jayanta Mukherjee 2 1 Department of Computer Science and Engineering, Indian Institute of Technology, Guwahati-781039,

More information

In this lecture. Background. Background. Background. PAM3012 Digital Image Processing for Radiographers

In this lecture. Background. Background. Background. PAM3012 Digital Image Processing for Radiographers PAM3012 Digital Image Processing for Radiographers Image Enhancement in the Spatial Domain (Part I) In this lecture Image Enhancement Introduction to spatial domain Information Greyscale transformations

More information

Geometry. Every Simplicial Polytope with at Most d + 4 Vertices Is a Quotient of a Neighborly Polytope. U. H. Kortenkamp. 1.

Geometry. Every Simplicial Polytope with at Most d + 4 Vertices Is a Quotient of a Neighborly Polytope. U. H. Kortenkamp. 1. Discrete Comput Geom 18:455 462 (1997) Discrete & Computational Geometry 1997 Springer-Verlag New York Inc. Every Simplicial Polytope with at Most d + 4 Vertices Is a Quotient of a Neighborly Polytope

More information

The packing problem: A divide and conquer algorithm on cellular automata

The packing problem: A divide and conquer algorithm on cellular automata The packing problem: A divide and conquer algorithm on cellular automata Nicolas Bacquey Groupe de Recherche en Informatique, Image, Automatique et Instrumentation de Caen Université de Caen Basse-Normandie,

More information

Relational Database: The Relational Data Model; Operations on Database Relations

Relational Database: The Relational Data Model; Operations on Database Relations Relational Database: The Relational Data Model; Operations on Database Relations Greg Plaxton Theory in Programming Practice, Spring 2005 Department of Computer Science University of Texas at Austin Overview

More information

Subpixel Corner Detection Using Spatial Moment 1)

Subpixel Corner Detection Using Spatial Moment 1) Vol.31, No.5 ACTA AUTOMATICA SINICA September, 25 Subpixel Corner Detection Using Spatial Moment 1) WANG She-Yang SONG Shen-Min QIANG Wen-Yi CHEN Xing-Lin (Department of Control Engineering, Harbin Institute

More information

The strong chromatic number of a graph

The strong chromatic number of a graph The strong chromatic number of a graph Noga Alon Abstract It is shown that there is an absolute constant c with the following property: For any two graphs G 1 = (V, E 1 ) and G 2 = (V, E 2 ) on the same

More information

Constraint Satisfaction Problems (CSPs)

Constraint Satisfaction Problems (CSPs) Constraint Satisfaction Problems (CSPs) CPSC 322 CSP 1 Poole & Mackworth textbook: Sections 4.0-4.2 Lecturer: Alan Mackworth September 28, 2012 Problem Type Static Sequential Constraint Satisfaction Logic

More information

EE 584 MACHINE VISION

EE 584 MACHINE VISION EE 584 MACHINE VISION Binary Images Analysis Geometrical & Topological Properties Connectedness Binary Algorithms Morphology Binary Images Binary (two-valued; black/white) images gives better efficiency

More information

Sets MAT231. Fall Transition to Higher Mathematics. MAT231 (Transition to Higher Math) Sets Fall / 31

Sets MAT231. Fall Transition to Higher Mathematics. MAT231 (Transition to Higher Math) Sets Fall / 31 Sets MAT231 Transition to Higher Mathematics Fall 2014 MAT231 (Transition to Higher Math) Sets Fall 2014 1 / 31 Outline 1 Sets Introduction Cartesian Products Subsets Power Sets Union, Intersection, Difference

More information

Adaptive Petri Net Based on Irregular Cellular Learning Automata and Its Application in Vertex Coloring Problem

Adaptive Petri Net Based on Irregular Cellular Learning Automata and Its Application in Vertex Coloring Problem 1 Adaptive Petri Net Based on Irregular Cellular Learning Automata and Its Application in Vertex Coloring Problem S. Mehdi Vahidipour, Mohammad Reza Meybodi and Mehdi Esnaashari Abstract An adaptive Petri

More information

Robert Cowen and Stephen H. Hechler. Received June 4, 2003; revised June 18, 2003

Robert Cowen and Stephen H. Hechler. Received June 4, 2003; revised June 18, 2003 Scientiae Mathematicae Japonicae Online, Vol. 9, (2003), 9 15 9 G-FREE COLORABILITY AND THE BOOLEAN PRIME IDEAL THEOREM Robert Cowen and Stephen H. Hechler Received June 4, 2003; revised June 18, 2003

More information

Introduction to Digital Image Processing

Introduction to Digital Image Processing Introduction to Digital Image Processing Ranga Rodrigo June 9, 29 Outline Contents Introduction 2 Point Operations 2 Histogram Processing 5 Introduction We can process images either in spatial domain or

More information