Continuous Turing Machine
Continuous Turing Machine
http://dx.doi.org/10.12785/amis/080536
Abstract: Contemporary computer theory is governed by the discretization of continuous problems. Classical Turing machines (TMs)
are originally built to solve computation and computability problems, which main feature is discreteness. However, even some simple
numerical calculations problems, e.g., iterations in Rn , generate difficulties to be described or solved by constructing a TM. This paper
explores the computability of continuous problems by proposing a class of continuous Turing machines (CTMs) that are an extension
of TMs. CTMs can be applied to the standard for the precision of algorithms. First, computable real numbers are precisely defined by
CTMs and their computations are regarded as the running of the CTMs. CTMs introduce the coded recursive descriptions, machine
states, and operations with the characters of computer instructions in essence compared with usual computable continuous models.
Hence, they can precisely present continuous computations with the form of processes. Second, the concepts of CTM computable
and CTM handleable are proposed. Moreover, the basic concepts on approximation theory such as convergency, metric space, and
fixed-point in Rn are defined in a new space CTMRn . Finally, an iterative algorithm is shown by constructing a CTM to solve linear
equations.
Keywords: Computational mathematics, computer theory, continuous Turing machine, real number computability, iteration.
theories and models are difficult to compatible with the Hybrid nets et al [17, 18] are proposed. These models do
classical model TMs. Hence, this paper attempts to not means that the number of new models is increase in
construct a class of extension TM to deal with real the series of computational models. Its purpose is to
number computability. correctly and easily present, solve, and analyze a class of
Numerical analysis involves the methods for real continuous problems. A good approximation generally
number calculations. However, it does not consider proves very valuably to solve a complex problem.
computability problems. Different computational models Therefore, an approximate method is considered in TMs
can obtain inconsistent results on whether a real number in this paper.
problems is computable. For example, a serious distortion Generally, continuous models are time-related.
or an entire wrong conclusion may be obtained if the real However, CTMs are regarded as time-independent. This
numbers computability is considered by TMs. Hence, section expands TMs to CTMs by introducing an example
discrete machines do not properly demonstrate real for a non-output and two-type nondeterministic TM M1
number computability. On the other hand, although the (Fig. 1(a)). First, M1 can be constructed by the following
theory of numerical analysis makes great achievements in algorithm.
the past, its developments necessarily need a reliable
computable theory.
This paper begins with an extension from discrete Algorithm for M1 construction.
TMs to continuous TMs. Then, a class of autonomous TM M1 :=“On input ω = ω1 , ω2 : // ω1 and ω2 represent
continuous Turing machines (CTMs) is proposed in initial inputs of the two tapes, respectively.
section 2. The rationality by using CTMs to explore the DO {
step1: If there is a ‘0’ on tape1, then move it to tape2 or
computability of real numbers is considered in section 3.
retain it in tape1 in a random manner.
CTMs have mainly two strengths compared with the
step2: If there is a ‘0’ in tape2, then move it to tape1 or
usual models. Firstly, the classic methods of TMs deal retain it in tape2 in a random manner.
with the computations of natural numbers, the sets of }while .T.” //Notation .T. means that the logical condition
natural number, and the arithmetical functions. A CTM of the loop ‘while’ is always true.
covers continuous computations and include discrete
computations. Second, it is realistic and feasible since the
concept of computable is defined by constructing CTMs. According to the view of machine computations, a
An algorithm is said to be computable if a CTM can be character ‘0’ in M1 can be considered as a certain mount
constructed for a certain input to reach an output at finite of resources. Hence, a single resource is represented by a
steps. single ‘0’ and several resources are represented by
CTMs have simple structures, basic operations, and multiple ‘0’ (0∗ ) in M1 . TMs are theoretical models of
precise descriptions of computations in the form of computers. In a real-world computer, the number of ‘0’
processes. A CTM series with respect to greater power can be represented as the amount of information. For
can be constructed by an iterative or recursive example, a single ‘0’ can be interpreted as 1G information
construction of CTMs. Iterative technology based on and ‘00000’ as 5G information.
CTMs is considered in section 4, which demonstrates an Second, a transformation is considered to divide each
approach to prove CTM-computable and to explain how ‘0’ into k equal parts. This new TM is denoted by M1k and
to construct a complex machines. Finally, a typical shown in Fig. 1(b). The world ‘block’ is assumed as an unit
example is given to illustrate real function computability, of ‘0’ in initial configurations. Each block is divided into
which can be regarded as a methodology to solve a class k. The new unit that is one k-th of block is called ‘piece’.
of computable problems. In section 5, we state the results For example shown in Fig 1, the initial configuration of
of this paper. M1 (Fig 1(a)) leads to the configuration of M1k (Fig 1(b)) in
which the resources are expressed in pieces.
Generally, the transition functions of multiple
2 Extension: discrete TM to continuous TM nondeterministic Turing machine (MNTM) have the form
The simplest way for a TM to compute four arithmetic δ : Q × Γ K → P(Q × Γ k × {L, R, S}k ),
operations is that the representation of numbers only uses
‘0’ [3], where notation ‘0’ is a character in the tape of where Q is the set of states, Γ is the tape alphabet, k is the
TMs, which is distinguished with the numerical zero. number of tapes, and P is power set. The expression
However, the representation method can lead to the δ (qi , a1 , · · · , ak ) ∈ P(q j , b1 , · · · , bk , L, . . . , R), ai , b j ∈ Γ
increase of storages. Importantly, by considering iterative
computations, a self-iterative TM can difficultly be means that if the sate of a machine is qi and read-write
constructed since computations, e.g., iterations, cannot be head 1 through k are reading symbols a1 through ak ,
easily represented by integers. Many researchers make respectively. The machine goes to one of possible states
extensions from discrete models to continuous ones, q j and writes symbols b1 through bk . Correspondingly,
where continuous automatons, continuous Petri nets, and transition functions directs each head to move left, right,
c 2014 NSP
Natural Sciences Publishing Cor.
Appl. Math. Inf. Sci. 8, No. 5, 2405-2416 (2014) / www.naturalspublishing.com/Journals.asp 2407
{
q2 0 δc q2 δm q3 M1(k)
0 q2 0 0 0 q3
0 q2 Controller
δ 2 := [δ mδ c ]
q1 0 0 δc q1 0 δm q2 0 tape11 1/k 1/k tape21
q1 q1 0
0 q2
tape12 1/k 1/k tape22
e 2k
{
Expressed tapes
δk
δ1
k
in blocks q1 k k 1 q2 k-1 k q2 k q3 1 q3
q1 k q2 1 Lk Lk
Evolve δ2 q2
q3 k-1
δ 2k k k q3
tape1k 1/k 1/k tape2k
configurations
for M 1(k) δ 1k q 1 1 δ 1k
q1 0 0 2 1−
k k q2 0 q3 k q3 Fig. 2: Structure of 2k-type M1K .
q1 q2 1 L0 Lk 1
q2 q3
δ 2k 0 0 q3
1−
Expressed δ 2k k k
in pieces
f
Fig. 1: Transformation of a TM: (a) ordinary TM M1 , (b) The fact that transition functions of a k-type TM
transformed ordinary TM M1k , represented for k=4, (c) state execute simultaneously is denoted by (δi δ j · · · δk ), where
graph of M1 , (d) evolve configurations for M1 , (e) implied evolve δi , δ j , · · · , and δk are transition functions from tape i to k,
configurations in Fig(d), and (f) evolve configurations for M1k . respectively. The structure of M1k , which can execute δ1 k
times simultaneously, is shown in Fig. 2. The execution of
δ1 in M1 equals the execution of (δ1k δ1k · · · δ1k ) in M1k . We
can change a way to describe transferred processes by
introducing some new notations. It facilitates to discuss
or to stay put. By considering M1 as an example and its the extension from discrete TMs to continuous TMs.
state graph shown in Fig 1(c), its evolutions contain three
types of transition functions: Let [δi \ δ j \ · · · \ δk ] be a class of orderly executive
δ1 : (qk , 0, ) = (qk+1 , , 0, R, R) sequences of transition functions.
Symbol ∈ Γ denotes that there has not a resource at Let [δi ]α = [(δi )α ] be a class of special executive
corresponding positions on the tape, i.e., blank. Now, we sequences, which performance means that TM
consider M1k with an strategy for the segmentation of implements transition function δi total α times
resources. Its transition functions are similar to M1 . simultaneously and removes or adds α piece resources in
However, let the scale of its evolutions be the unit of its tapes to produce a new configuration, where α is a
piece. For example, δ1 , δm , and δc in M1 are represented non-negative number.
by the following functions combinations: Fig. 3(a) shows a set of possible transitions of M1 that
are concerned with two block resources. In addition to
(qk , α , k − α ) = (qk , α − 1, k − α + 1, S, S), ∀α = 1, 2, · · · , k single execution of δ1 or δ2 , multiple transitions by the
δ1k :
(qk , 1, k − 1) = (qk+1 , , k, R, R)
execution of [δ1 \ δ2 ], [δ1 ]2 , and [δ2 ]2 are also represented.
δmk : (qk , {α , }, ) = (qk−1 , {α , }, , L, L), ∀α = 1, 2, · · · , k The possible transitions of M1k for k = 4 are shown in Fig.
δck : (qk , k − α , α ) = (qk , k − α + 1, α − 1, S, S), ∀α = 1, 2, · · · , k 3(b). M1k contains many and finite multiple transitions,
e.g., [δ1 ]3 , [δ2 ]2 and [δ2 ]6 . We apostrophe read-write head
By considering M1 and its evolved configurations and state alphabet ‘qi ’ for simplification. By observing
shown in Fig. 1(d), the execution of transition function δ1
the execution of [δ1 ]3 , its transition process can be
consists of removing a block from tape1 and adding a expressed in pieces as:
block to tape2. Correspondingly, by considering M1k and
its evolved configurations shown in Fig. 1(f), the tape1 1 4 [δ1 ]
3
2
execution of δ1k consists of removing a piece from tape1 −−−>
tape2 3 42
c 2014 NSP
Natural Sciences Publishing Cor.
2408 X. L. Chen et. al. : Continuous Turing Machine: Real Function Computability...
c 2014 NSP
Natural Sciences Publishing Cor.
Appl. Math. Inf. Sci. 8, No. 5, 2405-2416 (2014) / www.naturalspublishing.com/Journals.asp 2409
}
tape1
{
tape3
0 0 Md 2 0
input tape2 Controller tape4 simulation
tapes tapes Lemma 3.Two-type nondeterministic TM M1 has an
0 2
equivalent single-type deterministic TM Msd
tape5
Proof. By Lemma 1 and 2, we have the conclusion.
1#2#3#11#12#13#21# #33#111# #123#
address tape Lemma 4.Two-type nondeterministic TM M1k has an
k .
equivalent single-type deterministic TM Msd
Fig. 4: Structure of five-type deterministic Md .
c 2014 NSP
Natural Sciences Publishing Cor.
2410 X. L. Chen et. al. : Continuous Turing Machine: Real Function Computability...
Proof. Msd ∞ can be constructed by M k if k tends infinite. Definition 3.HALTT M = {hM K , ω i | M K is a TM that the
sd
We have its equivalent machine Msd by Lemma 4, where length of its computational history is finite or its
the number of work-spaces tends infinite. Hence, the computational history is convergent}.
mutual simulations between them are enabled. Of course, ∞
the length of the single tape of Msd is necessarily infinite Theorem 2.TM Mhalt has an equivalent single-tape
and Msd is a non-haltable TM in general sense. Note that deterministic TM Mordinary (ordinary means that it is a
machine halt in general sense equals classical TM halt [3, haltable TM).
4]. The concept corresponds to machine halt at the sense Proof. The fact that k tends infinite means that the number
of convergence of computational histories. For example, a of tapes tends infinite in unit piece. If the computational
machine is a non-haltable machine if the number of history of Mhalt ∞ is convergent, its approximate
resource divisions tends infinite. It has not acceptive and computations allows that there exists a reasonable length l
rejective states in general sense since these states cannot of computational history for transition functions at the
be achieved within a finite time. However, machine halt in sense of convergency. The evolution of Mhalt ∞ achieves
convergent meaning of computational histories is to terminal states and the machine outputs approximate
illustrates some important problems in CTMs. computational results if the number of state transitions
Theorem 1 guarantees that the division of resources comes to l.
does not increase the power of TMs. Importantly, any TM By using Theorem 1, we can find a single-tape
with resource division has an equivalent ordinary TM no deterministic TM Msd and make the length of its tape
matter how many tapes it has and it is deterministic or tends infinite. The single-tape is divided into infinite
nondeterministic. This equivalency necessarily satisfies number of work-groups. Actually, it is just attach the
machine non-haltable in theoretical sense. Actually, the ∞ to the single-tape of M such
longitudinal k tapes in Mhalt sd
equivalency cannot be guaranteed in real-world hardware ∞ .
that Msd is equivalent to Mhalt
environments. For example, infinite division of resources In this case, if the computational history of Mhalt∞ is
is not possible by the bit restriction of computers. convergent, Msd is haltable. The haltable Msd at the sense
Hence, a more general situations should be of convergency is denoted by Mordinary . Hence, Mordinary
considered. For example, we deal with the machines that ∞ have the same computational results.
and Mhalt
are similar to Msd ∞ , which can machine halt in general
∞ has not an equivalent TM M ∞ .
Theorem 3.Msd
sense. These machines can achieve acceptive or rejective halt
states. The judgments of these states should based on the Proof. By using Theorems 1 and 2, we only need to proof
length of computational histories since any simple that Msd is not equivalent to Mordinary . Msd cannot achieve
computation is infinite if k tends infinite. In other words, acceptive or rejective states since Msd cannot ensure
we consider the approximate calculation of Msd ∞.
machine halt. However, Mordinary has terminal states by
The classical computational history of a TM is usually considering the approximation. Hence, Msd cannot
considered as the configurations of the TM. However, if simulate the terminal states of Mordinary . Actually, Msd
real number is tacked, any configuration may has an can be regarded as the limiting state of the computations
infinite length. Hence, classical computational history of Mordinary . They are not equivalent in the sense of
cannot be applied to describe the dynamic behavior of the convergence of computational history.
TM with real numbers. Hence, a class of computational Theorems 1 and 2 guarantee the rationality of the
history with respect to state transitions is proposed. extension from TMs to CTMs such that CTMs can be
Definition 1.A string denoted by ωh = i jk · · · is said to be formally defined. In this paper, single-tape deterministic
a computational history if the string composed of the CTMs (ordinary CTMs) and the ordinary CTMs at the
subscripts of the existent states, where every two adjacent sense of convergence in computational history are
characters i and j represents that the machine restores defined. The former are models of computational theory
the computation path from state qi to q j . for real numbers and the latter are theoretical models of
real functional approximation. Other classes of CTMs are
In this case, the computational history of an equivalent to them.
non-haltable TM is a string with infinite length, even if
the TM has finite states. For example, the states and Definition 4.An ordinary CTM is a 7-tuple, (Q, Σ , Γ , δ α ,
transitions shown in Fig. 1(c) can generate computation q1 , qLIM LIM
accept , qre ject ), where
history with infinite length. Obviously, the length of 1. Q is a finite and non-empty set of states.
computational histories is finite if the machines are 2. Σ is the set of input alphabets. It comes from R+ and
haltable since the states of them are necessarily achieve is expressed inSblocks.
acceptive or rejective states. 3. Γ = Σ {♯, ∧ , · · · } is the set of tape alphabets,
where ‘ ♯’ is a symbol of work-space delimiter, ‘ ∧’ is a
Definition 2.A computational history of M k is said to be symbol of virtual head, and ‘ ’ is blank.
convergent if there exists an absolute difference between 4. δ α : Q × Γ → Q × Γ × {L, R, S} is the transition
the output of M k and another output of M k with the length function, where α is transfer quantity that is defined as a
l of computational history, which is less than any given ε . positive rational number.
c 2014 NSP
Natural Sciences Publishing Cor.
Appl. Math. Inf. Sci. 8, No. 5, 2405-2416 (2014) / www.naturalspublishing.com/Journals.asp 2411
c 2014 NSP
Natural Sciences Publishing Cor.
2412 X. L. Chen et. al. : Continuous Turing Machine: Real Function Computability...
δ2
function in certain hardware restriction. Verse is not true. [0#0]q reject
c 2014 NSP
Natural Sciences Publishing Cor.
Appl. Math. Inf. Sci. 8, No. 5, 2405-2416 (2014) / www.naturalspublishing.com/Journals.asp 2413
c 2014 NSP
Natural Sciences Publishing Cor.
2414 X. L. Chen et. al. : Continuous Turing Machine: Real Function Computability...
Theorem 5.(Recursion theorem in CTM) Let T be a CTM Theorem 6.(Fixed-point theorem in CTM) Let CT MRn be
that computes a function t : ΣCT
∗
M × ΣCT M → ΣCT M , then
∗ ∗ a complete metric space, ∃ < MT , ω >∈ CT MRn , CTM <
there exists a CTM U that computes a function u : ΣCT
∗
M→ MT , ω > possesses unique fixed-point such that
ΣCT M for every ω , such that
∗
< M, ω ∗ >=< MT , < M, ω ∗ >>
u(ω ) = t(< U, ω >) The proof is abbreviated since it is similar to that of the
fixed-point theorem in mathematic.
The proof is is abbreviated since it is similar to the This section introduces an example of solving a linear
recursion theorem in TMs [3]. Recursion theorem system equation
indicates that CTMs can output the descriptions of
n
themselves and continuous perform a computation by
these descriptions. Hence, any complex CTM can be ∑ ai j x j = bi , i = 1, 2, . . . , n
j=1
described by recursive coded methods. Theorem 5 is the
basis of the following definitions. by constructing a CTM Miteration to compute it. The
‘ω ’ is used to denote a possible string in a CTM. For equation can be denoted by the form
any x = (x1 , x2 , . . . , xn ) ∈ Rn , there exists a CTM M that n
takes ω = x1 x2 . . . xn as the input, which is written as xi = ∑ (δi j − αi j )x j + bi , i = 1, 2, . . . , n.
< M, ω >. All of these CTMs constitute a new complete j=1
space that is called CT MRn space.
The concept of distance in CT MRn space is similar to If mi j = δi j − αi j is hold, the iterative scheme can is
Euclidean distance. For any strings ω1 = x1 x2 . . . xn and represented as
ω2 = y1 y2 . . . yn , we can obtain < M, ω1 >, < M, ω2 >∈ n
∑ mi j x j
(k+1) (k)
CT MRn . The distance in CT MRn space is defined as xi = + bi , i = 1, 2, . . . , n,
follows: j=1
k = 0, 1, 2, . . .
ρ (< M, ω1 >, < M, ω2 >) =< Msqrt , <
The CTM Miteration can be constructed recursively by
Msum(i=1 to n) , < Msquare , < Msub , xi − yi >>>> . Theorem 5. Firstly, we construct CT Msub (it is similar to
Msubstract ) to compute mi j . Second, CT Msub is constructed
If x, y ∈ R, we have the distance (k)
to compute mi j x j . Finally, CT Msum is introduced to deal
ρ (< M, ω1 >, < M, ω2 >) = (k)
with ∑nj=1 mi j x j + bi . Machine Miteration can be executed
by inputting the coded descriptions of CT Msub , CT Msub ,
< Mabs , < Msub , x − y >> .
CT Msum , and their corresponding inputs on the tapes of
It is easy to prove that they satisfy distance axioms. Miteration . Fig. 8 shows the structure of Miteration .
Definition 10.Let CT MRn be a metric space and Proposition 1.Iterative computation to solve system
< M, ωn >, n = 1, 2, . . . be CTMs in CT MRn space. A linear equations is CTM handleable if it satisfies Theorem
CTM < M, ωn > is convergent to < M, ω >, written as 6 (Fixed-point theorem in CTM).
Proof. If the iterative computation does not satisfy
lim < M, ωn >=< M, ω >, fixed-point theorem, then the computation may divergent
n→∞
within two situations. First, the computational history
if ρ (< M, ωn >, < M, ω >) →< M, 0 > may be finite by embedding a controllable CTM such that
Miteration can machine halt at a given length. However, the
Definition 11.Let CT MRn be a metric space. Function fact violates the meaning of approximation.
< MT , ω >: CT MRn → CT MRn is a CTM with the ability Second, many convergent values lead to different
of contraction (it is similar to the contraction operator in approximate values, which can generate different
mathematic) if ∃ θ, 0 ≤ θ < 1, computational histories. Hence, the iterative computation
∀ < M, ω1 >, < M, ω2 >∈ CT MRn , we have is not CTM handleable by Definition 8. The proposition is
ρ (< MT , < M, ω1 >>, < MT , < M, ω1 >>) ≤ proofed.
Actually, if the iterative computation satisfies
< Mmul , θ ♯ρ (< M, ω1 >, < M, ω2 >) > fixed-point theorem, related results are necessarily
convergent, uniqueness, and reasonable approximation.
Definition 12.Let CT MRn be a metric space. < MT , ω >: According to algorithm 6, if halting judgment condition ε
CT MRn → CT MRn . CTM < M, ω ∗ > is called the fixed- is given, Miteration is necessarily machine halt and the
point of < MT , ω >, if there exists a CTM < M, ω ∗ >∈ length of the unique computational history is finite.
CT MRn such that According to Definition 8 (CTM handleable), iterative
computation to solve system linear equation is Miteration
< M, ω ∗ >=< MT , < M, ω ∗ >> handleable.
c 2014 NSP
Natural Sciences Publishing Cor.
Appl. Math. Inf. Sci. 8, No. 5, 2405-2416 (2014) / www.naturalspublishing.com/Journals.asp 2415
References
[1] D.P. Yang and A.S. Li, Theory of conputability. Beijing:
Science press, (1975).
c 2014 NSP
Natural Sciences Publishing Cor.
2416 X. L. Chen et. al. : Continuous Turing Machine: Real Function Computability...
Mingwei Tang
is an associate professor with
the School of Mathematics
and Computer Science
Technology of Xihua
University. He received
a Ph.D. degree at the School
of Computer Science and
Engineering from University
of Electronic Science and
Technology of China in 2011. His current research
interests include network security and information
hiding.
c 2014 NSP
Natural Sciences Publishing Cor.