Theory of Computation Β· DFA Simulator

DFA Validator Suite

Simulate Deterministic Finite Automata validating passwords and email addresses in parallel

Validation Rules β€” DFA Selection
+ Custom:
Password & Controls
Try:
Simulation Trace
Theoretical Foundation

πŸ”΅ Regular Languages & DFAs

Each constraint is a regular language recognized by a DFA β€” a 5-tuple M = (Q, Ξ£, Ξ΄, qβ‚€, F).

Q = states   Ξ£ = alphabet
Ξ΄: Q Γ— Ξ£ β†’ Q   qβ‚€ = start   F = accepting

🟒 Closure Under Intersection

Final validation = intersection of all DFA languages:

L = L(M₁) ∩ L(Mβ‚‚) ∩ … ∩ L(Mβ‚™)

πŸ“§ Email DFAs

Format Structure@ SymbolDot RulesValid Chars

Email is decomposed into 3 DFAs: structure ([email protected]), single-@ check, and consecutive-dot check. Each runs independently and acceptance is intersected for the final result.

⚑ Why Modular?

Product construction on all constraints causes state explosion. Running DFAs independently and intersecting acceptance is clean and efficient.