Topological Characterizations of Automata Theory Based on Quantum Logic
DOI:
Author:
Affiliation:

Clc Number:

Fund Project:

  • Article
  • |
  • Figures
  • |
  • Metrics
  • |
  • Reference
  • |
  • Related
  • |
  • Cited by
  • |
  • Materials
  • |
  • Comments
    Abstract:

    In this paper, some topological characterizations of automata theory based on quantum logic (abbr. l-valued automata theory) are discussed. First, l-valued successor and source operators are redefined and the equivalences of l-valued successor operators, source operators and l-valued subautomata are demonstrated. Afterwards, some topological characterizations in terms of the l-valued successor. source operators and l-valued subautomata are described, and then some fundamental properties of l-valued successor operators, source operators and l-valued subautomata are characterized. Particularly, when the multiplication (&) is distributive over the union in the truth-value lattices, some of the special properties of l-valued successor operators, source operators and l-valued subautomata are verified. So a weaker limitation to form a topology is obtained. Finally, it is shown that the l-valued topologies in terms of the l-valued successor, source operators and l-valued subautomata are equivalent.

    Reference
    Related
    Cited by
Get Citation

郭秀红.基于量子逻辑的自动机理论的拓扑性质.软件学报,2007,18(6):1282-1286

Copy
Share
Article Metrics
  • Abstract:
  • PDF:
  • HTML:
  • Cited by:
History
  • Received:June 24,2005
  • Revised:June 29,2006
  • Adopted:
  • Online:
  • Published:
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063