Next Article in Journal
Exponentially Convergent Galerkin Method for Numerical Modeling of Lasing in Microcavities with Piercing Holes
Next Article in Special Issue
Interdimensionality
Previous Article in Journal
On Uniform Stability with Growth Rates of Stochastic Skew-Evolution Semiflows in Banach Spaces
Previous Article in Special Issue
Solomon Marcus Contributions to Theoretical Computer Science and Applications
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Simulations between Network Topologies in Networks of Evolutionary Processors

by
José Ángel Sánchez Martín
1 and
Victor Mitrana
1,2,*
1
Departamento de Sistemas Informáticos, Universidad Politécnica de Madrid, C/Alan Turing s/n, 28031 Madrid, Spain
2
National Institute for Research and Development of Biological Sciences, Independentei Bd. 296, 060031 Bucharest, Romania
*
Author to whom correspondence should be addressed.
Axioms 2021, 10(3), 183; https://doi.org/10.3390/axioms10030183
Submission received: 19 July 2021 / Revised: 31 July 2021 / Accepted: 6 August 2021 / Published: 11 August 2021
(This article belongs to the Special Issue In Memoriam, Solomon Marcus)

Abstract

:
In this paper, we propose direct simulations between a given network of evolutionary processors with an arbitrary topology of the underlying graph and a network of evolutionary processors with underlying graphs—that is, a complete graph, a star graph and a grid graph, respectively. All of these simulations are time complexity preserving—namely, each computational step in the given network is simulated by a constant number of computational steps in the constructed network. These results might be used to efficiently convert a solution of a problem based on networks of evolutionary processors provided that the underlying graph of the solution is not desired.

1. Introduction

Networks of evolutionary processors (NEPs for short) have been extensively investigated in the last two decades since their generative variant has been introduced in [1]. An informal description of a NEP is as follows: it is a graph whose nodes are hosts for some very simple processors inspired by the basic mutations at the DNA nucleotide level, namely insertion, deletion, and substitution. Each processor is able to make just one of these operations on the data existing in the node that hosts it. Data may be organized as strings, multisets, two-dimensional pictures, graphs, etc. In this work, we consider that the data consist of strings. A very important assumption is that each string appears in an arbitrarily large number of identical copies such that if the processor can apply an operation to different sites of a string, the operation is actually applied simultaneously to each of these sites in different copies of the string. Furthermore, if more that one rule can be applied to a string, each rule is applied to a different copy of that string. This process described above is considered to be an evolutionary step. Each evolutionary step alternates with a communication step. In a communication step, all the strings that can leave a node (they can pass the output filter associated with that node) actually leave the node and copies of them enter each node connected to the left node, provided that they can pass the input filter of the arriving node. We say that an input string, which initially is in a designated node, called the input node, is accepted if another designated node, called the output node, is non-empty after a finite number of computational steps (evolution, communication). The complexity of a computation is defined in the usual way.
From the very beginning, NEPs have been proven to be computationally complete models [2,3], such that they have been used to solve hard problems [4]. Several variants have been considered depending on the positions of filters: filters associated with nodes (different filters [3], uniform filters [5], polarization [6]) or filters associated with edges [7]. Later on, several ways of simulating and implementing different variants of these networks have been reported [8,9,10,11]. A rather new and attractive direction of research has been to investigate the possibility of simulating directly and efficiently one variant by another without the intermediate step of an extra computational model (Turing machine, tag-system, register machine, etc.) in between, see, e.g., [5].
This work continues this line of research by proposing direct simulations between two NEPs such that the input one is an arbitrary NEP while the output one has a predefined topology that can be a complete graph, a star graph, or a grid. Thus, after a preliminary section with the basic definitions and concepts, we give the construction of a complete NEP equivalent to a given NEP. We continue with another section, where we give such a construction for a star graph and finally a construction for a grid NEP. A short conclusion ends the paper.

2. Basic Definitions

The basic concepts and notations that are to be used throughout the paper are defined in the sequel; the reader may consult [12] for basic concepts that are not defined here. We use the following concepts and notations:
  • V is the set of all strings formed by symbols in V;
  • | x | is the length of string x;
  • ε V is the empty string, | ε | = 0 ;
  • a l p h ( x ) is the minimal alphabet V such that x V .
We now recall some definitions from a few papers where the networks of evolutionary processors have been introduced, see, e.g., [1], for the generating model, and [3,13,14], for the accepting model. Let a b be a rule, where a , b ( V { ε } ) :
  • If a , b V , then the rule is called a substitution rule;
  • If a V and b = ε , then the rule is called a deletion rule;
  • If a = ε and b V , then the rule is called an insertion rule.
The set of all substitution, deletion, and insertion rules over V is denoted by S u b V , D e l V , and I n s V , respectively.
Given a rule σ as above and a string w V , we define the following actions of σ on w, to any position (∗), to the leftmost position (l), and to the rightmost position (r), as explained in the sequel:
If σ a b S u b V , then
σ ( w ) = { u b v : u , v V ( w = u a v ) } , { w } , o t h e r w i s e
According to this definition, applying a rule to a string may result in a finite number of strings. This implies that in our setting each string may appear in an arbitrarily large number of copies.
If σ a ε D e l V , then σ ( w ) = { u v : u , v V ( w = u a v ) } , { w } , otherwise
σ r ( w ) = { u : w = u a } , { w } , otherwise σ l ( w ) = { v : w = a v } , { w } , otherwise
If σ ε a I n s V , then σ ( w ) = { u a v : u , v V ( w = u v ) } ,
σ r ( w ) = { w a } , σ l ( w ) = { a w } .
For every rule σ , α { , l , r } , and L V , we define σ α ( L ) = w L σ α ( w ) . Given a finite and non-empty set of rules M, a string w and a language L, we define the followings:
M α ( w ) = σ M σ α ( w ) and M α ( L ) = w L M α ( w ) .
In the original papers mentioned above, the rewriting operations defined above were referred as evolutionary operations since they may be viewed as formal operations abstracted from local DNA mutations.
For two disjoint subsets P (permitting symbols) and F (forbidding symbols) of an alphabet V and a string z over V, we define the predicates:
φ ( s ) ( z ; P , F ) P a l p h ( z ) F a l p h ( z ) =
φ ( w ) ( z ; P , F ) ( P ) ( a l p h ( z ) P ) F a l p h ( z ) = .
For every language L V and β { ( s ) , ( w ) } , we define:
φ β ( L , P , F ) = { z L φ β ( z ; P , F ) } .
An evolutionary processor (EP) over an alphabet V is a tuple ( M , P I , F I , P O , F O ) , where:
  • M is a set of either substitution, or deletion or insertion rules over the alphabet V. Formally: ( M S u b V ) or ( M D e l V ) or ( M I n s V ) . The set M represents the set of evolutionary rules of the processor;
  • P I , F I V are the input permitting/forbidding symbols of the processor, while P O , F O V are the output permitting/forbidding symbols of the processor.
We denote the set of evolutionary processors over V by E P V . A network of evolutionary processors (NEP for short) is a seven-tuple Γ = ( V , U , G , N , α , β , I n ̲ , O u t ̲ ) , where:
  • V and U are the input and network alphabets, respectively, V U .
  • G = ( X G , E G ) is an undirected graph without loops, with the set of nodes X G and the set of edges E G . Each edge is given in the form of a binary set. G is called the underlying graph of the network;
  • N : X G E P U is a mapping which associates with each node x X G the evolutionary processor N ( x ) = ( M x , P I x , F I x , P O x , F O x ) ;
  • α : X G { , l , r } ; α ( x ) gives the action mode of the rules of node x on the strings existing in that node;
  • β : X G { ( s ) , ( w ) } defines the type of the input/output filters of a node. More precisely, for every node, x X G , the following filters are defined:
    input   filter :   ρ x ( · ) = φ β ( x ) ( · ; P I x , F I x ) ,
    output   filter :   τ x ( · ) = φ β ( x ) ( · ; P O x , F O x ) .
    That is, ρ x ( z ) (resp. τ x ( z ) ) indicates whether or not the string z can pass the input (resp. output) filter of x. More generally, ρ x ( L ) (resp. τ x ( L ) ) is the set of strings of L that can pass the input (resp. output) filter of x.
  • I n ̲ and O u t ̲ X G are the input node, and the output node, respectively, of the NEP.
A configuration of a NEP Γ as above is a function C : X G 2 U which associates a multiset of strings C ( x ) with every node x of Γ . As each string appears in an arbitrarily large number of copies, we work with the support of this multiset. For a string w V , we define the initial configuration of Γ on w by C 0 ( w ) ( I n ̲ ) = { w } and C 0 ( w ) ( x ) = for all x X G \ { I n ̲ } .
A configuration is followed by another configuration either by an evolutionary step or by a communication step. A configuration C follows a configuration C by an evolutionary step if each component C ( x ) , for some node x, is the result of applying all the evolutionary rules in the set M x that can be applied to the strings in the set C ( x ) . Formally, configuration C follows the configuration C by a an evolutionary step, written as C C , if
C ( x ) = M x α x ( C ( x ) )   for   all   x X G .
In a communication step of a NEP the following actions take place simultaneously for every node x:
(i)
All the strings that can pass the output filter of a node are sent out of that node;
(ii)
All the strings that left their nodes enter all the nodes connected to their original ones, provided that they can pass the input filter of the receiving nodes.
Note that, according to this definition, those strings that are sent out of a node and cannot pass the input filter of any node are lost.
Formally, a configuration C follows a configuration C by a communication step (we write C C ) iff for all x X G
C ( x ) = ( C ( x ) \ τ x ( C ( x ) ) ) { x , y } E G ( τ y ( C ( y ) ) ρ x ( C ( y ) ) ) .
Let Γ be a NEP, the computation of Γ on the input string w V is a sequence of configurations C 0 ( w ) , C 1 ( w ) , C 2 ( w ) , , where C 0 ( w ) is the initial configuration of Γ on w, C 2 i ( w ) C 2 i + 1 ( w ) and C 2 i + 1 ( w ) C 2 i + 2 ( w ) , by a for all i 0 . Note that the configurations are changed by alternative steps.
A computation as above halts, if there exists a configuration in which the set of strings existing in the output node O u t ̲ is non-empty. Given a NEP Γ and an input string w, we say that Γ accepts w if the computation of Γ on w halts. Consequently, we define the language accepted by Γ by
L ( Γ ) = { z V   the   computation   of   Γ   on   z   halts } .
The time complexity of the halting computation C 0 ( z ) , C 1 ( z ) , C 2 ( z ) , C m ( z ) of Γ on z V is denoted by t i m e Γ ( z ) and equals m. The time complexity of Γ is the function from I N to I N , T i m e Γ ( n ) = m a x { t i m e Γ ( z ) z L ( Γ ) , | z | = n } . In other words, T i m e Γ ( n ) delivers the maximal number of computational steps carried out by Γ for accepting an input string of length n.

3. Simulating Any NEP with a Complete NEP

Theorem 1.
Given an arbitrary NEP Γ, there exists a complete NEP Γ such that the following two conditions are satisfied:
1. 
L ( Γ ) = L ( Γ ) ;
2. 
T i m e Γ ( n ) O ( T i m e Γ ( n ) ) .
Proof. 
Let Γ = ( V , U , G , N , α , β , x 1 , x n ) be a NEP with the underlying graph G = ( X G , E G ) and X G = { x 1 , x 2 , , x n } for some n 1 ; x 1 I n ̲ and x n H a l t ̲ . We construct the NEP Γ = ( V , U , G , N , α , β , x s t a r t , x n s ) ; x s t a r t I n ̲ and x n s H a l t ̲ , where
V = V , U = U T ,
T = { t i l , t i r , t i l , t i r , t i l , t i r 1 i n }
Note that the underlying graph G is a complete graph. First, we add the following nodes to G :
  • node x s t a r t : M = { ε t 1 l } ,   if   α ( x 1 ) l { ε t 1 r } ,   if   α ( x 1 ) = l , P I = , F I = T , P O = , F O = , α = l ,   if   α ( x 1 ) l r ,   if   α ( x 1 ) = l , β = ( w ) .
  • nodes x i s , 1 i n (they actually simulate the work of x i in Γ ):
    M = M ( x i ) , P I = P I ( x i ) , F I = F I ( x i ) T \ { t i l , t i r } , P O = P O ( x i ) , F O = F O ( x i ) , α = α ( x i ) , β = β ( x i ) .
For each node x i , 1 i n in Γ we add a subnetwork to Γ according to the subsequent cases:
Case 1. If α ( x i ) = l , the subnetwork is defined as follows (these nodes are used for preparing the string in the aim of processing them in the nodes x i s ):
  • nodes x i I n s , 1 i n : M = { ε t i r } , P I = { t i l } , F I = , P O = { t i r } , F O = , α = r , β = ( w ) .
  • nodes x i D e l , 1 i n : M = { t i l ε } , P I = { t i r } , F I = , P O = , F O = , α = l , β = ( w ) .
  • nodes x i S u b , 1 i n : M = { t i r t j r { x i , x j } Γ } { t i r t i r } { t i r t i r } , P I = { t i r , t i r , t i r } , F I = { t i l } , P O = , F O = , α = , β = ( w ) .
Case 2. If α ( x i ) = r , the subnetwork is analogous to the Case 1 with the characters l and r interchanged.
Case 3. If α ( x i ) = , the subnetwork is defined as follows (the role of these nodes is the same as above, namely to prepare the strings for being processed in the nodes x i s ):
  • nodes x i S u b , 1 i n : M = { t i r t j r { x i , x j } Γ } { t i l t j l { x i , x j } Γ } { t i r t i r } { t i l t i l } { t i l t i l } , P I = { t i l , t i r , t i l , t i r , t i l } , F I = , P O = , F O = , α = , β = ( w ) .
Let w be the input string in Γ . In the input node x s t a r t , the character t 1 l is inserted at the beginning of the string if α ( x 1 ) { r , } , or the character t 1 r is inserted at the end of the string, provided that α ( x 1 ) = l . Next, the string enters x 1 S u b where the character is replaced with t 1 l and t 1 r , respectively. Then, the string can only enter x 1 s and the simulation starts. Note that the same evolutionary rules applicable in x 1 Γ are also possible in x 1 s since the special character t 1 l or t 1 r is set up in a way that it does not block the computation of nodes with α = r and α = l , respectively. Inductively, we may assume that a string of the form t i l w or w t i r lies in the node x i s Γ if and only if the string w lies in the node x i Γ .
Let w be transformed into w in the node x i and sent to the connected nodes to x i in Γ . Then, a string t i l w or a string w t i r is produced in the node x i s and sent to the node x i S u b . Let us analyze the case of a string t i l w . The process is analogous for the other string. In x i S u b , the character t i l is replaced with the symbol t j l , assuming that { x i , x j } Γ , which ensures the new string can only be accepted by subnetworks j corresponding to nodes x j connected to x i in the original network Γ . From here, the process differs in accordance with the value α of the connected node x j .
  • If α ( x j ) = l , the string can only enter x j I n s where the symbol t j r is appended to it. The new string, t j l w t j r , continues through x j D e l where t j l is removed and x j S u b where t j r is replaced with t j r , allowing it to enter the node x j s . Since the character t j r is at the end of the string, it does not interfere with the application of evolutionary rules at the left of the string;
  • If α ( x j ) = r or α ( x j ) = , the string directly enters x j S u b and the symbol t j l is replaced with t j l . Then, the string enters x j s . As one can see, the communication step in Γ has been simulated by a constant number of (evolution and communication) steps in Γ . A new evolutionary step in Γ is now simulated. It follows that L ( Γ ) = L ( Γ ) . Furthermore, the number of steps in Γ for simulating an evolutionary step followed by a communication one in Γ is constant; hence, T i m e Γ ( n ) O ( T i m e Γ ( n ) ) holds.

4. Simulating Any NEP with a Star NEP

Theorem 2.
Given an arbitrary NEP Γ, there exists a star NEP Γ such that the following two conditions are satisfied:
1. 
L ( Γ ) = L ( Γ ) ;
2. 
T i m e Γ ( n ) O ( T i m e Γ ( n ) ) .
Proof. 
Let Γ = ( V , U , G , N , α , β , x 1 , x n ) be a NEP with the underlying graph G = ( X G , E G ) and X G = { x 1 , x 2 , , x n } for some n 1 ; x 1 I n ̲ and x n H a l t ̲ . We construct the NEP Γ = ( V , U , G , N , α , β , x s t a r t , x n s ) ; x s t a r t I n ̲ and x n s H a l t ̲ , where
V = V , U = U T ,
T = { t i l , t i r , t i l , t i r , t i l , t i r , t i l , t i r 1 i n }
The star network uses the definitions illustrated above for the complete network, with the following modifications:
We add a new node S t a r to the subnetwork which acts as the center of the star network.
  • node S t a r : M = { t i l t j l { x i , x j } Γ } { t i r t j r { x i , x j } Γ } { t i l t i l } { t i r t i r } , P I = , F I = , P O = , F O = , α = , β = ( w ) .
The nodes x i S u b , 1 i n are modified as follows:
Case 1. If α ( x i ) = l :
  • nodes x i S u b , 1 i n : M = { t i r t i r } { t i r t i r } , P I = { t i r , t i r } , F I = { t i l } , P O = , F O = , α = , β = ( w ) .
Case 2. If α ( x i ) = r , the nodes x i S u b are analogous to the case 1 with the characters l and r interchanged.
Case 3. If α ( x i ) = , the nodes x i S u b , 1 i n are defined in the following way:
  • nodes x i S u b , 1 i n : M = { t i r t i r } { t i l t i l } { t i l t i l } , P I = { t i l , t i r , t i l } , F I = , P O = , F O = , α = , β = ( w ) .
Let w be the input string in Γ . In the input node x s t a r t , the character t 1 l is inserted in the left-hand side of the string if α ( x 1 ) { r , } , or the character t 1 r is inserted at the end of the string provided that α ( x 1 ) = l . Next, the string enters S t a r where no rule can be applied. From S t a r , it can only enter x 1 S u b where the character is replaced with t 1 l and t 1 r , respectively. The new string returns to S t a r where t 1 l and t 1 r are changed to t 1 l and t 1 r . Then, the string can only enter x 1 s and the simulation starts. Note that the same evolutionary rules applicable in x 1 Γ are also possible in x 1 s since the special character t 1 l or t 1 r is set up in a way that it does not block the computation of nodes with α = r and α = l , respectively. Inductively, we may assume that a string of the form t i l w or w t i r lies in the node x i s Γ if and only if the string w lies in the node x i Γ .
Let w be transformed into w in the node x i and sent to the connected nodes to x i in Γ . Then, a string t i l w or a string w t i r is produced in the node x i s and sent to the node S t a r . Let us analyze the case of a string t i l w . The process is analogous for the other string. In S t a r , the character t i l is replaced with the symbol t j l , granted that { x i , x j } Γ , which ensures the new string can only be accepted by subnetworks j corresponding to nodes x j connected to x i in the original network Γ . From here, the process is similar to the one described in the previous proof.
  • If α ( x j ) = l , the string can only enter x j I n s where the symbol t j r is attached at the end of it. The new string, t j l w t j r , continues through x j D e l where t j l is removed and x j S u b where t j r is replaced with t j r . Then, t j r is switched with t j r in S t a r , allowing it to enter the node x j s . Since the character t j r is at the end of the string, it does not interfere with the application of evolutionary rules at the left of the string;
  • If α ( x j ) = r or α ( x j ) = , the string directly enters x j S u b and the symbol t j l is replaced with t j l . Then, the string enters x j s after having t j l changed to t j l in S t a r . As in the previous construction, the communication step in Γ has been simulated by a constant number of (evolution and communication) steps in Γ , and a new evolutionary step in Γ is going to be simulated. We conclude that the two networks accept the same language.
The explanations above allow us to infer that any step in Γ is simulated by a constant number of steps in Γ ; hence, T i m e Γ ( n ) O ( T i m e Γ ( n ) ) holds. □

5. Simulating Any NEP with a Grid NEP

Theorem 3.
Given an arbitrary NEP Γ there exists a grid NEP Γ such that the following two conditions are satisfied:
1. 
L ( Γ ) = L ( Γ ) ;
2. 
T i m e Γ ( n ) O ( T i m e Γ ( n ) ) .
Proof. 
Let Γ = ( V , U , G , N , α , β , x 1 , x n ) be a NEP with the underlying graph G = ( X G , E G ) and X G = { x 1 , x 2 , , x n } for some n 1 ; x 1 I n ̲ and x n H a l t ̲ . We construct the NEP Γ = ( V , U , G , N , α , β , x s t a r t , x n s ) ; x s t a r t I n ̲ and x n s H a l t ̲ , where
V = V , U = U T ,
T = { t i l , t i r , t i l , t i r 1 i n }
First, we add the following nodes to Γ :
  • node x s t a r t : M = { ε t 1 l } ,   if   α ( x 1 ) l { ε t 1 r } ,   if   α ( x 1 ) = l , P I = , F I = T , P O = , F O = , α = l ,   if   α ( x 1 ) l r ,   if   α ( x 1 ) = l , β = ( w ) .
  • nodes x i s , 1 i n : M = M ( x i ) , P I = P I ( x i ) , F I = F I ( x i ) T \ { t i l , t i r } , P O = P O ( x i ) , F O = F O ( x i ) , α = α ( x i ) , β = β ( x i ) .
For each node x i , 1 i n in Γ we add a subnetwork to Γ according to the subsequent cases:
Case 1. If α ( x i ) = l , the subnetwork is defined as follows:
  • nodes x i I n s , 1 i n : M = { ε t i r } , P I = , F I = T , P O = { t i r } , F O = , α = r , β = ( w ) .
  • nodes x i D e l , 1 i n : M = { t i l ε } , P I = { t i l } , F I = , P O = , F O = , α = l , β = ( w ) .
  • nodes x i S u b , 1 i n : M = { t i r t j r { x i , x j } Γ } { t i r t i r } { t i r t i r } , P I = T , F I = , P O = , F O = , α = , β = ( w ) .
Case 2. If α ( x i ) = r , the subnetwork is analogous to the case 1 with the symbols l and r interchanged.
Case 3. If α ( x i ) = , the subnetwork is defined as follows:
  • nodes x i S u b , 1 i n : M = { t i r t j r { x i , x j } Γ } { t i l t j l { x i , x j } Γ } { t i l t i l } { t i r t i r } , P I = T , F I = , P O = , F O = , α = , β = ( w ) .
Lastly, we add a set of dummy nodes to complete the grid topology with the specifications below:
  • nodes D i , 1 i 2 n α ( x i ) = : M = , P I = , F I = U , P O = , F O = , α = , β = ( w ) .
  • nodes D : M = , P I = , F I = { t i l , t i r 1 i n } , P O = , F O = , α = , β = ( w ) .
The grid network is set up in the following way.
  • The node x s t a r t is in the top left corner. The first column is composed by it followed by the node x 1 s corresponding to the input node x 1 Γ and the remaining nodes x i s arranged in any order;
  • The second column is composed by a dummy node D and the nodes x i S u b . Each node x i S u b is connected to the node x i s through the left edge;
  • The third column is composed by a dummy node D and the nodes x i D e l . Each node x i D e l is connected to the node x i S u b through the left edge. In the case of α = , a node D i is used instead of a node x i D e l ;
  • The fourth column is composed by a dummy node D and the nodes x i I n s . Each node x i I n s is connected to the node x i D e l through the left edge. In the case of α = , a node D i is used instead of a node x i I n s ;
  • The fifth column is composed by nodes D.
Let w be the input string in Γ . In the input node x s t a r t , the character t 1 l is inserted in the beginning of the string if α ( x 1 ) { r , } , or the character t 1 r is inserted at the end of the string, if α ( x 1 Γ ) = l . Then, the string can only enter x 1 s and the simulation starts. Note that the same evolutionary rules applicable in x 1 Γ are also possible in x 1 s since the special character t 1 l or t 1 r is set up in a way that it does not block the computation of nodes with α = r and α = l , respectively. Inductively, we may assume that a string of the form t i l w or w t i r lies in the node x i s Γ if and only if the string w lies in the node x i Γ .
Let w be transformed into w in the node x i and sent to the connected nodes to x i in Γ . Then, a string t i l w or a string w t i r is produced in the node x i s and sent to the connected node x i S u b . In this node, the symbols t i l and t i r are replaced with t j l and t j r , respectively, granted that { x i , x j } Γ . Then, the string continues through the second column of x i S u b nodes until it ultimately enters the node x j S u b . Note that even if the string passes through the other nodes x k S u b k j , no rule can applied so the string remains unchanged until it gets to the desired node. Next, the computation can be continued in one of the following ways:
  • If α ( x j ) = l , no rule can be applied in x j S u b and the string enters x j D e l . In that node, the symbol t j l is removed. Next, since it does not contain any character t T , the string can only enter the node x j I n s where a character t j r is attached to the end. Then, the string continues through the fifth column of dummy nodes D and it ultimately returns to x j S u b where t j r is replaced with t j r , allowing it to enter the node x j s ;
  • If α ( x j ) = r or α ( x j ) = , the string directly enters x j S u b and the symbol t j l is replaced with t j l . Then, the word enters x j s . As in the previous proofs, we conclude that L ( Γ ) = L ( Γ ) , as well as T i m e Γ ( n ) O ( T i m e Γ ( n ) ) .

6. Conclusions and Further Work

We have proposed three constructions for simulating an arbitrary NEP by a NEP having an underlying structure that is a complete graph, a star graph, and a two-dimensional grid, respectively. All these simulations are time efficient in the sense that every computational step in the given network is simulated by a constant number of computational steps in the constructed network.
In our view, it would be of interest whether or not similar results are valid for other variants of NEPs, such as polarized NEPs or NEPs with filtered connections as well as for variants of networks of splicing processors.

Author Contributions

Conceptualization, V.M.; methodology, V.M. and J.Á.S.M.; validation, V.M. and J.Á.S.M.; formal analysis, J.Á.S.M.; investigation, V.M. and J.Á.S.M.; writing—original draft preparation, J.Á.S.M.; writing—review and editing, V.M. and J.Á.S.M.; supervision, V.M.; funding acquisition, V.M. Both authors have read and agreed to the published version of the manuscript.

Funding

This work was partially supported by a grant of the Romanian Ministry of Education and Research, CCCDI-UEFISCDI, Project No. PN-III-P2-2.1-PED-2019-2391, within PNCDI III.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Castellanos, J.; Martín-Vide, C.; Mitrana, V.; Sempere, J.M. Networks of evolutionary processors. Acta Inform. 2003, 39, 517–529. [Google Scholar] [CrossRef]
  2. Csuhaj-Varjú, E.; Martín-Vide, C.; Mitrana, V. Hybrid networks of evolutionary processors are computationally complete. Acta Inform. 2005, 41, 257–272. [Google Scholar] [CrossRef]
  3. Manea, F.; Margenstern, M.; Mitrana, V.; Pérez-Jiménez, M.J. A new characterization of NP, P, and PSPACE with accepting hybrid networks of evolutionary processors. Theory Comput. Syst. 2010, 46, 174–192. [Google Scholar] [CrossRef]
  4. Manea, F.; Mitrana, V. All NP-problems can be solved in polynomial time by accepting hybrid networks of evolutionary processors of constant size. Inf. Process. Lett. 2007, 103, 112–118. [Google Scholar] [CrossRef]
  5. Bottoni, P.; Labella, A.; Manea, F.; Mitrana, V.; Petre, I.; Sempere, J.M. Complexity-preserving simulations among three variants of accepting networks of evolutionary processors. Nat. Comput. 2011, 10, 429–445. [Google Scholar] [CrossRef]
  6. Alarcón, P.; Arroyo, F.; Mitrana, V. Networks of polarized evolutionary processors. Inform. Sci. 2014, 265, 189–197. [Google Scholar] [CrossRef]
  7. Drăgoi, C.; Manea, F.; Mitrana, V. Accepting networks of evolutionary processors with filtered connections. J. Univ. Comput. Sci. 2007, 13, 1598–1614. [Google Scholar]
  8. Navarrete, C.; Cruz, M.; Rey, E.; Ortega, A.; Rojas, J. Parallel simulation of NEPs on clusters. In Proceedings of the International Conferences on Web Intelligence and Intelligent Agent Technology, Lyon, France, 22–27 August 2011; Volume 3, pp. 171–174. [Google Scholar]
  9. Gómez, S.; Ortega, A.; Orgaz, P. Distributed simulation of NEPs based nn-demand cloud elastic computation. Adv. Comput. Intell. 2015, 9094, 40–54. [Google Scholar]
  10. Gómez, S.; Ordozgoiti, B.; Mozo, A. NPEPE: Massive natural computing engine for optimally solving NP-complete problems in Big Data scenarios. New Trends Databases Inf. Syst. 2015, 539, 207–217. [Google Scholar]
  11. Gómez, S.; Mitrana, V.; Păun, M.; Vararuk, S. High performance and scalable simulations of a bio-inspired computational model. In Proceedings of the International Conference on High Performance Computing & Simulation, Dublin, Ireland, 15–19 July 2019; pp. 543–550. [Google Scholar]
  12. Rozenberg, G.; Salomaa, A. (Eds.) Handbook of Formal Languages; Springer: Berlin, Germany, 1998. [Google Scholar]
  13. Manea, F.; Martín-Vide, C.; Mitrana, V. On the size complexity of universal accepting hybrid networks of evolutionary processors. Math. Struct. Comput. Sci. 2007, 17, 753–771. [Google Scholar] [CrossRef]
  14. Loos, R.; Manea, F.; Mitrana, V. Small universal accepting hybrid networks of evolutionary processors. Acta Inform. 2010, 47, 133–146. [Google Scholar] [CrossRef]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Sánchez Martín, J.Á.; Mitrana, V. Simulations between Network Topologies in Networks of Evolutionary Processors. Axioms 2021, 10, 183. https://doi.org/10.3390/axioms10030183

AMA Style

Sánchez Martín JÁ, Mitrana V. Simulations between Network Topologies in Networks of Evolutionary Processors. Axioms. 2021; 10(3):183. https://doi.org/10.3390/axioms10030183

Chicago/Turabian Style

Sánchez Martín, José Ángel, and Victor Mitrana. 2021. "Simulations between Network Topologies in Networks of Evolutionary Processors" Axioms 10, no. 3: 183. https://doi.org/10.3390/axioms10030183

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop