Palindrome using Turing Machines | Problems on Turing Machines|Example 5| Theory of Computer Science
Do Check out my Udemy Course on Automata Theory and Theory of Computation and get certified: https://www.udemy.com/course/theory-of-computation-and-automata...
🔥 Related Trending Topics
LIVE TRENDSThis video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!
THIS VIDEO IS TRENDING!
This video is currently trending in Bangladesh under the topic 's'.
About this video
Do Check out my Udemy Course on Automata Theory and Theory of Computation and get certified:
https://www.udemy.com/course/theory-of-computation-and-automata-part-1/
Drop a comment in the comment section for free membership vouchers
Turing Machines:
It consists of a head which reads the input tape. A state register stores the state of the Turing machine.
After reading an input symbol, it is replaced with another symbol, its internal state is changed, and it moves from one cell to the right or left.
If the TM reaches the final state, the input string is accepted, otherwise rejected.
A TM can be formally described as a 7-tuple (Q, X, Σ, δ, q0, B, F) where −
Q is a finite set of states
X is the tape alphabet
Σ is the input alphabet
Δ is a transition function; δ : Q × X → Q × X × {Left_shift, Right_shift}.
q0 is the initial state
B is the blank symbol
F is the set of final states
Applications of TM:
a. Language Recognition
b. Language Generation
c. Computation of some functions
ABOUT THE VIDEO :
In this video I will introduce you all to the concept of Turing Machines. I will also show you how to solve problems based on acceptance of Palindromes using Turing Machines . We will see how to design a TM for a language :
L={any palindrome consisting inputs a and b}
Kindly Use the Comments Section if you have queries regarding the concept taught in the video.
MY OTHER PLAYLISTS:
1. Cryptography and System Security :
https://www.youtube.com/playlist?list=PLx2aAxxVN1NV-cQTrfm1XnWU1rDrN3QsJ
2. Advanced System Security and Digital Forensics
https://www.youtube.com/watch?v=8Zvjk9iGBzs&list=PLx2aAxxVN1NVk9JwAQwCNA159FrSXQ5Hn
Video Information
Views
1.8K
Total views since publication
Likes
24
User likes and reactions
Duration
13:04
Video length
Published
Mar 30, 2020
Release date
Quality
hd
Video definition
About the Channel
Tags and Topics
This video is tagged with the following topics. Click any tag to explore more related content and discover similar videos:
#What is Turing machine and how it works? #turing machine #alan turing #Turing Machines #turing test #Turing #automata theory #automata lectures #Automata Theory #theory of computation #Sridhar #Sridhar Iyer #sridhar #What is the Turing machine used for? #What is Turing machine with example? #turing machine example #Problems on Turing Machines #Calculator using Turing Machine #Palindromes #Palindromes Using Turing Machines #Palindromes using TM #Even Palindrome #Odd Palindrome
Tags help categorize content and make it easier to find related videos. Browse our collection to discover more content in these categories.