Subset Construction Algorithm
Get Subset Construction Algorithm essential facts below. View Videos or join the Subset Construction Algorithm discussion. Add Subset Construction Algorithm to your PopFlock.com topic list for future reference or share this resource on social media.
Subset Construction Algorithm

In the theory of computation and automata theory, the powerset construction or subset construction is a standard method for converting a nondeterministic finite automaton (NFA) into a deterministic finite automaton (DFA) which recognizes the same formal language. It is important in theory because it establishes that NFAs, despite their additional flexibility, are unable to recognize any language that cannot be recognized by some DFA. It is also important in practice for converting easier-to-construct NFAs into more efficiently executable DFAs. However, if the NFA has n states, the resulting DFA may have up to 2n states, an exponentially larger number, which sometimes makes the construction impractical for large NFAs.

The construction, sometimes called the Rabin-Scott powerset construction (or subset construction) to distinguish it from similar constructions for other types of automata, was first published by Michael O. Rabin and Dana Scott in 1959.[1]

## Intuition

To simulate the operation of a DFA on a given input string, one needs to keep track of a single state at any time: the state that the automaton will reach after seeing a prefix of the input. In contrast, to simulate an NFA, one needs to keep track of a set of states: all of the states that the automaton could reach after seeing the same prefix of the input, according to the nondeterministic choices made by the automaton. If, after a certain prefix of the input, a set S of states can be reached, then after the next input symbol x the set of reachable states is a deterministic function of S and x. Therefore, the sets of reachable NFA states play the same role in the NFA simulation as single DFA states play in the DFA simulation, and in fact the sets of NFA states appearing in this simulation may be re-interpreted as being states of a DFA.[2]

## Construction

The powerset construction applies most directly to an NFA that does not allow state transformations without consuming input symbols (aka: "?-moves"). Such an automaton may be defined as a 5-tuple (Q, ?, T, q0, F), in which Q is the set of states, ? is the set of input symbols, T is the transition function (mapping a state and an input symbol to a set of states), q0 is the initial state, and F is the set of accepting states. The corresponding DFA has states corresponding to subsets of Q. The initial state of the DFA is {q0}, the (one-element) set of initial states. The transition function of the DFA maps a state S (representing a subset of Q) and an input symbol x to the set T(S,x) = ∪{T(q,x) | q ? S}, the set of all states that can be reached by an x-transition from a state in S. A state S of the DFA is an accepting state if and only if at least one member of S is an accepting state of the NFA.[2][3]

In the simplest version of the powerset construction, the set of all states of the DFA is the powerset of Q, the set of all possible subsets of Q. However, many states of the resulting DFA may be useless as they may be unreachable from the initial state. An alternative version of the construction creates only the states that are actually reachable.[4]

### NFA with ?-moves

For an NFA with ?-moves (also called an ?-NFA), the construction must be modified to deal with these by computing the ?-closure of states: the set of all states reachable from some given state using only ?-moves. Van Noord recognizes three possible ways of incorporating this closure computation in the powerset construction:[5]

1. Compute the ?-closure of the entire automaton as a preprocessing step, producing an equivalent NFA without ?-moves, then apply the regular powerset construction. This version, also discussed by Hopcroft and Ullman,[6] is straightforward to implement, but impractical for automata with large numbers of ?-moves, as commonly arise in natural language processing application.[5]
2. During the powerset computation, compute the ?-closure ${\displaystyle \{q'~|~q\to _{\varepsilon }^{*}q'\}}$ of each state q that is considered by the algorithm (and cache the result).
3. During the powerset computation, compute the ?-closure ${\displaystyle \{q'~|~\exists q\in Q',q\to _{\varepsilon }^{*}q'\}}$ of each subset of states Q' that is considered by the algorithm, and add its elements to Q'.

### Multiple initial states

If NFAs are defined to allow for multiple initial states,[7] the initial state of the corresponding DFA is the set of all initial states of the NFA, or (if the NFA also has ?-moves) the set of all states reachable from initial states by ?-moves.

## Example

The NFA below has four states; state 1 is initial, and states 3 and 4 are accepting. Its alphabet consists of the two symbols 0 and 1, and it has ?-moves.

The initial state of the DFA constructed from this NFA is the set of all NFA states that are reachable from state 1 by ?-moves; that is, it is the set {1,2,3}. A transition from {1,2,3} by input symbol 0 must follow either the arrow from state 1 to state 2, or the arrow from state 3 to state 4. Additionally, neither state 2 nor state 4 have outgoing ?-moves. Therefore, T({1,2,3},0) = {2,4}, and by the same reasoning the full DFA constructed from the NFA is as shown below.

As can be seen in this example, there are five states reachable from the start state of the DFA; the remaining 11 sets in the powerset of the set of NFA states are not reachable.

## Complexity

NFA with 5 states (left) whose DFA (right) requires 16 states.[4]

Because the DFA states consist of sets of NFA states, an n-state NFA may be converted to a DFA with at most 2n states.[2] For every n, there exist n-state NFAs such that every subset of states is reachable from the initial subset, so that the converted DFA has exactly 2n states, giving ?(2n) worst-case time complexity.[8][9] A simple example requiring nearly this many states is the language of strings over the alphabet {0,1} in which there are at least n characters, the nth from last of which is 1. It can be represented by an (n + 1)-state NFA, but it requires 2n DFA states, one for each n-character suffix of the input; cf. picture for n=4.[4]

## Applications

Brzozowski's algorithm for DFA minimization uses the powerset construction, twice. It converts the input DFA into an NFA for the reverse language, by reversing all its arrows and exchanging the roles of initial and accepting states, converts the NFA back into a DFA using the powerset construction, and then repeats its process. Its worst-case complexity is exponential, unlike some other known DFA minimization algorithms, but in many examples it performs more quickly than its worst-case complexity would suggest.[10]

Safra's construction, which converts a non-deterministic Büchi automaton with n states into a deterministic Muller automaton or into a deterministic Rabin automaton with 2O(n log n) states, uses the powerset construction as part of its machinery.[11]

## References

1. ^ Rabin, M. O.; Scott, D. (1959). "Finite automata and their decision problems". IBM Journal of Research and Development. 3 (2): 114-125. doi:10.1147/rd.32.0114. ISSN 0018-8646.
2. ^ a b c Sipser, Michael. "Theorem 1.19". Introduction to the Theory of Computation. pp. 55-56. ISBN 0-534-94728-X.
3. ^ Hopcroft, John E.; Ullman, Jeffrey D. (1979). "The equivalence of DFA's and NFA's". Introduction to Automata Theory, Languages, and Computation. Reading Massachusetts: Addison-Wesley. pp. 22-23. ISBN 0-201-02988-X.CS1 maint: ref=harv (link)
4. ^ a b c Schneider, Klaus (2004). Verification of reactive systems: formal methods and algorithms. Springer. pp. 210-212. ISBN 978-3-540-00296-3.
5. ^ a b Van Noord, Gertjan (2000). "Treatment of epsilon moves in subset construction". Computational Linguistics. 26 (1): 61-76. arXiv:cmp-lg/9804003. doi:10.1162/089120100561638.
6. ^ Hopcroft & Ullman (1979), pp. 26-27.
7. ^ Rothe, Jörg (2006). Complexity Theory and Cryptology: An Introduction to Cryptocomplexity. Texts in Theoretical Computer Science. Springer. pp. 21-22. ISBN 9783540285205..
8. ^ Lupanov, Oleg B. (1963). "A comparison of two types of finite sources". Problemy Kibernetiki. 9: 321-326.
9. ^ Moore, Frank R. (1971). "On the bounds for state-set size in the proofs of equivalence between deterministic, nondeterministic, and two-way finite automata". IEEE Transactions on Computers. C-20 (10): 1211-1214. doi:10.1109/T-C.1971.223108..
10. ^ Brzozowski, J. A. (1963). "Canonical regular expressions and minimal state graphs for definite events". Proc. Sympos. Math. Theory of Automata (New York, 1962). Polytechnic Press of Polytechnic Inst. of Brooklyn, Brooklyn, N.Y. pp. 529-561. MR 0175719.
11. ^ Safra, S. (1988). "On the complexity of ?-automata". Proceedings of the 29th Annual Symposium on Foundations of Computer Science (FOCS '88). Washington, DC, USA: IEEE Computer Society. pp. 319-327. doi:10.1109/SFCS.1988.21948..