The search for symmetry, as an unusual yet profoundly appealing phenomenon, and the origin of regular, repeating configuration patterns have long been a central focus of complexity science and physics. To better grasp and understand symmetry of configurations in decentralized toroidal architectures, we employ group-theoretic methods, which allow us to identify and enumerate these inputs, and argue about irreversible system behaviors with undesired effects on many computational problems. The concept of so-called “configuration shift-symmetry” is applied to two-dimensional cellular automata as an ideal model of computation. Regardless of the transition function, the results show the universal insolvability of crucial distributed tasks, such as leader election, pattern recognition, hashing, and encryption. By using compact enumeration formulas and bounding the number of shift-symmetric configurations for a given lattice size, we efficiently calculate the probability of a configuration being shift-symmetric for a uniform or density-uniform distribution. Further, we devise an algorithm detecting the presence of shift-symmetry in a configuration. Given the resource constraints, the enumeration and probability formulas can directly help to lower the minimal expected error and provide recommendations for system’s size and initialization. Besides cellular automata, the shift-symmetry analysis can be used to study the nonlinear behavior in various synchronous rule-based systems that include inference engines, Boolean networks, neural networks, and systolic arrays.
Symmetry is a synonym for beauty and rarity, and generally perceived as something desired. In this paper, we investigate an opposing side of symmetry and show how it can irreversibly “corrupt” a computation, and restrict a system’s dynamics and its potentiality. We demonstrate this fundamental phenomenon, which we call “configuration shift-symmetry,” affecting many crucial distributed tasks on the simplest gridlike synchronous system of cellular automation. We show how to count these symmetric inputs depending on a lattice size and its prime factorization, how likely they are encountered, and how to detect them.
I. INTRODUCTION
The structure of the computational rules that result in regular, repeating system configurations has been studied by many, yet the question of how the natural and engineered system organize into symmetric structures is not completely known. To understand the role of symmetry of the starting configurations (the inputs), how they are processed (the machine), and produce the final configurations with desired properties (the outputs) we use a cellular automata (CA) as a simple distributed model of computation. First introduced by John von Neumann, CAs were instrumental in the exploration of logical requirements for machine self-replication and information processing in nature.45 Despite having no central control and limited communication among the components, CAs are capable of universal computation and can exhibit various dynamical regimes.9,56,63 As one of the structurally simplest distributed systems, CAs have become a fundamental model for studying complexity in its purest form.20,64 Subsequently, CAs have been successfully employed in numerous research fields and applications, such as modeling artificial life,36 physical equations,24,58 and social and biological simulations.22,32,52,53
The CA input configurations define a language that is processed by the machine. Exploring the structural symmetries of the input language not only translates to an efficient machine implementation but also allows us to argue about a problem insolvability and the irreversibility of computation.
In this paper, we explore the concept of shift-symmetry and revisit a well-known fact that any standard CA maintains a configuration shift-symmetry due to uniformity and synchronicity of cells. We show that once a system reaches a symmetric, i.e., spatially regular configuration, the computation will never revert from this attractor and will fail to solve all problems that require asymmetric solutions. As a result, the number of symmetries of the dynamical system is never decreasing. When a configuration slips to a symmetric, repeating pattern the configuration space of the CA irreversibly folds, causing a permanent regime “shift.” Consequently, a nonsymmetric solution cannot be reached from a shift-symmetric configuration. A more general implication is that a configuration is unreachable (even if symmetric) if a source configuration has a symmetry not contained in the target. Nonsymmetric tasks, such as leader election or pattern recognition, i.e., tasks expecting a final configuration to be nonsymmetric, are, therefore, principally insolvable, since for any lattice size there always exist input configurations that are symmetric. As a hypothesis, we also briefly discuss the eventual gradual increase of system’s symmetries at the end of this paper, however, without any strong claims or proofs attached.
Using basic results from group theory and elementary combinatorics, we develop three progressively more efficient enumeration techniques based on mutually-independent generators to answer the question of how many potential shift-symmetric configurations there are in any given two-dimensional CA lattice. As a side product, we demonstrate that the shift-symmetry is closely linked to prime factorization. We introduce and prove lower and upper bounds for the number of shift-symmetric configurations, where the lower bound (local minima) is tight and reached only for prime lattice sizes. We enumerate shift-symmetric configurations for a given lattice size and number of active cells.
Finally, we derive a formula and bounds for the probability of selecting shift-symmetric configuration randomly generated from a uniform or density-uniform distribution. We develop a shift-symmetry detection algorithm and prove its worst-case and average-case time complexities.
A. Applications
All the formulas and proofs presented in this paper assume a two-dimensional CA with any number of states, and arbitrary uniform transition and neighborhood functions, which makes our results widely applicable.
Knowing the number of shift-symmetric configurations, we can directly determine the probability of selecting a shift-symmetric configuration by chance. This probability then equals an error lower bound or expected insolvability for any nonsymmetric task. As we show, the insolvability caused by shift-symmetry rapidly decreases asymptotically with the lattice size for a uniform distribution. For instance, the probability is for a lattice, but drops to around for a lattice. Since the number of shift-symmetric configurations heavily depends on the prime factorization of the lattice size, the probability function is nonmonotonously decreasing. To minimize the occurrence of shift-symmetries for uniform distribution, we generally recommend using prime lattices, or at least avoiding even ones. On the other hand, the probability for a density-uniform distribution is quite high, regardless of primes; it is around , even for a lattice.
The distribution error-size constraints have important consequences for designing robust and efficient computational procedures for many crucial distributed problems, such as leader election,6,56 pattern recognition,49 edge detection,55 image translation,30 convex hull/minimum bounding rectangle,14 hashing or collision resolution for associative memory,16 encryption,60 and random number generation.57 For these tasks, an expected final configuration, e.g., reproduction of a certain two-dimensional image, is frequently nonshift-symmetric, and, therefore, unreachable from a symmetric configuration. Alternatively, an expected configuration can be unreachable even if it is shift-symmetric, which occurs when the vector space of its generating vectors (shifts) do not contain all the shifts of an initial configuration.
Practical implications of these properties include performance degradation of systolic Central Processing Unit (CPU) arrays and nanoscale multicore systems.67 Our results span to the hardware implementations of synchronous CAs with Field-Programmable Gate Array (FPGA), used, e.g., for traffic signals control,33 random number generation,54 and reaction-diffusion model;31 and spintronics, where computation is achieved by coupled oscillators.10,59 Also, current efforts to implement two or three-dimensional cellular automata using DNA tiles26,61 and/or gel-separated compartments in so-called “gellular automata”27,35 may face problems related to configuration shift-symmetry if a synchronous update is considered.
B. Related work
In their seminal work, Packard and Wolfram46 identified the importance of symmetry and showed that the global properties of a CA emerge as a function of the transition function’s reflective and rotational symmetries. The fundamental algebraic properties of additive and nonadditive CAs were studied by Martin et al.,41 who demonstrated that in simple cases, there is a connection between the global behavior and the structure of the configuration transitions. Wolz and de Oliveira65 exploited the structure and the symmetry in the transition table to design an efficient evolutionary algorithm that found the best results for the density classification and parity problems. Marquez-Pita et al.39,40 used a brute-force approach to find similar input configurations that produce the same outputs. Their results are a compact transition function re-description schema that use wildcards to represent the many-to-one computation rules on a majority problem. Bagnoli et al.5 explored different methods of master–slave synchronization and control of totalistic cellular automata. A number of computation-theoretic results for CA were summarized by Culik et al.,21 who investigated CAs through the eyes of set theory and topology. The effect of symmetry on the complexity of Boolean functions was thoroughly researched by Babai et al.4 Pippenger47 studied translation functions capable of correcting CA configurations under a specific kind of symmetry: rotation (an isometry with a corner coordinate fixed).
Besides the symmetry of “transition functions” and the design of transition functions resulting in regular or synchronized patterns, a number of contributions to the theoretical CA literature have addressed the general structure and implications of shift-symmetric “configurations” also called translation invariant, or simply periodic, as we do here. This problem has been studied primarily in the context of group theory,13 through a general approach using stabilizers, group actions, and Bernoulli shifts. In particular, the work by Castillo-Ramirez and Gadouleau,12 for example, approaches the problem using Möbius inversion of the subgroup lattice. Our derivation differs from their work by leveraging the affordances of specifying in advance that our symmetries are restricted to shift-symmetries, i.e., the specific case of Cartesian powers of cyclic groups in two dimensions, and proceeding inductively, which allows us to derive stronger results for the subproblem of our interest. In particular, we provide more efficient and executable enumeration formulas in an algorithmic sense and a better lower bound for the number of aperiodic configurations. Note that Castillo-Ramirez and Gadouleau improved the bound found by Gao et al.25
Another recent article23 explores similar questions regarding the number of distinct binary configurations of toroidal arrays in the presence of rotational and reflection symmetries. For our purposes, the ratio of symmetric to nonsymmetric configurations is of greater interest than a simple enumeration of the total. Accordingly, our work differs from theirs by our focus on enumerating how many of these configurations possess some nontrivial symmetry (and, additionally, we do not wish to be limited to the binary case of an alphabet of size 2).
The concept of symmetry in number theory has been applied to so-called tapestry design and periodic forests,3,42 which relates to CA configurations. However, the triangular topology and geometric branching differs from the discrete toroidal Cartesian topology typically used for CAs.
One of our main motivations is the pioneering work of Angluin,2 who noticed that a ring containing anonymous components (processors), which are all in the same state, will never break its homogeneous configuration and elect a leader. This intuitive observation is, in fact, a special case of the concept of configuration shift-symmetry for CAs. We will show that Angluin’s homogeneous state, which corresponds to a configuration of all zeros or all ones in a binary CA, is the most symmetric configuration for a given lattice size.
The concept of shift-symmetry is related to the notion of regular domains in computational mechanics.19,28,50,51 A shift-symmetric configuration is essentially a (global) regular domain spread to a full lattice. Although we cannot apply our results directly to regular domains at the level of subconfigurations, because we pay no attention to local symmetries and noncyclic and nonregular borders, the number of possible shift-symmetric configurations gives at least an upper bound on the number of possible regular domains.
In our previous work,8 we proved that configuration shift-symmetry, along with loose-coupling of active cells, prevents a leader from being elected in a one-dimensional CA.6 The “leader election” problem, first introduced by Smith,56 requires processors to reach a final configuration where exactly one processor is in a leader state (one) and all others are followers (zero). Leader election is a representative of a problem class where the solution is an asymmetric, nonhomogeneous, transitionally and rotationally invariant system configuration. A final fixed-point configuration is asymmetric, since it contains only one processor in a leader state. Clearly, leader election and symmetry are “enemies,” and, in fact, leader election is often called symmetry-breaking.
To enumerate shift-symmetric configurations for a one-dimensional case,8 we employed only basic combinatorics. Here, in order to span to two dimensions, we extend our enumeration machinery to include some basic concepts from group theory and we rely heavily on the notion of independent generators. We show that the insolvability caused by configuration symmetry extends beyond leader election to a whole class of nonsymmetric problems.
C. Model
By definition, a CA17 consists of a lattice of components, called “cells,” and a “state set” . A state of the cell with index is denoted . A “configuration” is then a sequence of cell states
Given a topology for the lattice and the number of neighbors , a “neighborhood” function maps any pair to the -tuple of cells’ states that are accessible (visible) to cell in configuration . Note that each cell is usually its own neighbor.
The transition rule is applied in parallel to each cell’s neighborhood, resulting in the synchronous update of all of the cells’ states . The transition rule is represented either by a transition table, also called a look-up table, or a finite state transducer.29 Here we focus exclusively on “uniform” CAs, where all cells share the same transition function. The “global transition rule” is defined as the transition rule with the scope over all configurations: .
In this paper, we analyze two-dimensional CAs, where cells are topologically organized on a two-dimensional grid with cyclic boundaries, i.e., we treat them as tori. The true power of our analysis is that it applies to two-dimensional CAs with arbitrary neighborhood and transition functions. We rely only on their uniformity: each cell has the same neighborhood and transition function; and synchronous update, the attributes typically assumed for a standard CA.
Figure 1 shows the update mechanism for a two-dimensional binary CA with a Moore neighborhood, a square neighborhood with radius containing cells. The dynamics of two-dimensional CAs are illustrated as a series of configuration snapshots, where an active cell is black and an inactive cell white (Fig. 2).
Schematic of the configuration update for a binary two-dimensional CA, where the first nine bits in the transition table represent the flattened Moore neighborhood and the last bit is the output.
Schematic of the configuration update for a binary two-dimensional CA, where the first nine bits in the transition table represent the flattened Moore neighborhood and the last bit is the output.
Example space–time diagrams of a leader-electing CA on lattice size from Ref. 7. Figures show a CA computation starting with a random initial configuration (time ), followed by configuration snapshots. The CA reaches a final configuration with a single active cell (leader) at time .
Example space–time diagrams of a leader-electing CA on lattice size from Ref. 7. Figures show a CA computation starting with a random initial configuration (time ), followed by configuration snapshots. The CA reaches a final configuration with a single active cell (leader) at time .
II. SHIFT-SYMMETRIC CONFIGURATIONS
As stated by Angluin,2 the problem of reaching a “center” (i.e., leader) in homogeneous configurations is insolvable by any anonymous deterministic algorithm (including CAs). The CA uniformity can be embedded in its transition function, the deterministic update, synchronicity, topology, configuration, and cells’ anonymity. Intuitively, a fully uniform system in terms of its structure, configuration, and computational mechanisms cannot produce any reasonable or complex dynamics.
We show that Angluin’s homogeneous configurations of and belong to a much larger class of so-called shift-symmetric configurations. In this section, we formalize the concept of configuration shift-symmetry by employing vector translations and group theory. Figure 3 depicts a CA computation on a two-dimensional shift-symmetric configuration. Compared to the one-dimensional case,8 two dimensions are more symmetry-potent.
Space–time diagrams of CA computation on a two-dimensional binary shift-symmetric configuration showing a lattice at three consecutive time steps. Once reached, a shift-symmetry cannot be broken.
Space–time diagrams of CA computation on a two-dimensional binary shift-symmetric configuration showing a lattice at three consecutive time steps. Once reached, a shift-symmetry cannot be broken.
It is important to mention that we deal with “square” configurations only. Nevertheless, we suggest most of the lemmas and theorems could be extended to incorporate arbitrary rectangular shapes. Also, the formulas and methodology to enumerate two-dimensional shift-symmetric configurations could be generalized to arbitrarily many dimensions. For consistency, however, we leave the rectangular as well as -dimensional extensions for future consideration. Note that in order to improve the readability of the main text, all proofs and formally defined lemmas and theorems appear in Appendix A. The equations that have nontrivial proofs in the Appendix are labeled with the “” symbol. See, e.g., Eq. (4′) Lemma E.4.
First, we define a shift-symmetric (square) configuration by a given vector as shown in Fig. 4. Formally, for a nonzero vector (pattern shift) we denote by
the set of all “shift-symmetric square configurations” of size relative to over the alphabet , where denotes coordinatewise addition on .
Schematic of a shift-symmetric two-dimensional configuration generated by the vector on .
Schematic of a shift-symmetric two-dimensional configuration generated by the vector on .
Note that as opposed to our previous work,7 we renamed “symmetric” to “shift-symmetric” configurations to avoid confusion with reflective or rotational symmetries. These two symmetry types, unlike shift-symmetry, are not generally preserved by a transition function unless we impose certain “symmetric” properties on the transitions.
Since any translation by a nonzero vector defines a configuration symmetry, we can study shift-symmetric configurations with the techniques of group theory. From now on, we will call such a nonzero vector that we use for state translation a “generator” formalized as
where is the cyclic subgroup of generated by .
Trivially, for any nonzero
In the following text, we bridge shift-symmetry, which is associated with configurations, i.e., static “states,” with any uniform transition rule, which defines the “dynamics” of CA. We show that shift-symmetry cannot be broken, thus it fundamentally restricts the reachable states and the potentiality of a transition rule. More formally, for a vector and any uniform global transition rule
and so, by induction, a nonsymmetric configuration is unreachable from a shift-symmetric
As a consequence, several tasks for CA are principally insolvable. For instance, a target configuration for leader election56 contains exactly one cell in the leader state . This configuration is asymmetric for as shown in Fig. 5 (asym-d), and, therefore, unreachable from any shift-symmetric configuration. Further, several image-processing tasks illustrated in Fig. 5 are insolvable: e.g., image translation (sym-c to asym-c)30 and pattern recognition or noise filtering (sym-c to asym-f and sym-a to sym-b).49 Also, the task of random57 or prime number generation is insolvable if (for = 7: sym-a to asym-e). If a configuration is shift-symmetric, the associative memory16 has a corrupted (nonuniform) hashing function to handle collisions (e.g., sym-a to asym-a). This in general sense also applies to encryption.60
Examples of shift-symmetric configurations with generating vector(s) in the left, and shift-asymmetric configurations in the right column, all on the lattice . Since a shift-symmetry by a specific vector cannot be lost, there exists no CA (transition function), which would eventually reach any of the asymmetric configurations (right) from any of the symmetric ones (left). That also means a shift-symmetric configuration by a vector cannot be reached from another shift-symmetric configuration, which is not generated by 〈u〉. For instance, the configuration sym-a, generated by the vector , cannot be transformed to the configuration sym-b generated by the vector , but can be transformed to the configuration sym-c, since its vector space . Reachability among the shift-symmetric configurations in the figure is indicated by arrows.
Examples of shift-symmetric configurations with generating vector(s) in the left, and shift-asymmetric configurations in the right column, all on the lattice . Since a shift-symmetry by a specific vector cannot be lost, there exists no CA (transition function), which would eventually reach any of the asymmetric configurations (right) from any of the symmetric ones (left). That also means a shift-symmetric configuration by a vector cannot be reached from another shift-symmetric configuration, which is not generated by 〈u〉. For instance, the configuration sym-a, generated by the vector , cannot be transformed to the configuration sym-b generated by the vector , but can be transformed to the configuration sym-c, since its vector space . Reachability among the shift-symmetric configurations in the figure is indicated by arrows.
III. ENUMERATING SHIFT-SYMMETRIC CONFIGURATIONS
In this section, we will further investigate shift-symmetric two-dimensional configurations and ask how many there are in a square lattice of size . First, to generalize shift-symmetry and lay a solid ground for group-centric analysis, we define the symmetric configurations over several generators.
Let . We define the set of -symmetric configurations to be the set
where . In other words, denotes the set of all shift-symmetric configurations of size over the alphabet with a generator set .
Directly from the definition, for any subset ,
and for any
The following equivalence, which may sound counterintuitive at first, adapts shift-symmetry for the theory of groups. It states that if a vector generates a cyclic “subgroup” of another vector , then its set of shift-symmetric configurations is a “superset” (not a subset!) of that generated by the vector and vice versa, i.e., for any
Now, in a straightforward manner, we define the set of all shift-symmetric configurations over all possible combinations of vectors (shifts) for a given lattice as
Due to nontrivial intersections of the sets , it is fairly unpractical to count the shift-symmetric configurations over all vectors. We, instead, construct significantly fewer generators using prime factors of , which equivalently produce an entire set of shift-symmetric configurations.
We start with the definition of the generators. For any natural number , let be the prime factorization, where denotes the number of distinct prime factors. We define the generator set as
where for each prime divisor
The total number of these generators is then
Using some divisibility arguments, we can prove that they indeed produce all shift-symmetric configurations
Further, we show that these prime-based generators are mutually independent, thus greatly simplifying the counting problem to relatively compact closed formulas. For any distinct (),
and for any distinct , where is a prime divisor of and
In particular,
Finally, we are ready to enumerate shift-symmetric configurations. In the following formulas, given any , , we write whenever the coordinates satisfy for every . We write if and . We denote the sum of the coordinates by , and for any , we write for the -tuple whose coordinates all equal . Let be the prime factorization of , where , the number of distinct prime factors of . Note that a one-by-one lattice offers no symmetries since there exists no nonzero shift in .
As the base, we first combine the generators directly by the inclusion-exclusion principle and apply the fact that these generators are mutually independent [Eq. (15′)], as well as that their joint size is at most [Eq. (16′)]. That gives us
where and
An alternative and more efficient counting is based on an idea of grouping of the exponential elements from the original formula [Eq. (17′)], which are costly to calculate. It goes as follows:
where and has the th coordinate
The final formula that follows is the most efficient because, besides having the exponential elements grouped, it also reduces the inner binomial sum to a simple expression ,
where and
Interestingly, for a prime lattice the vector is and , or and , which forces formula (19′) to collapse to
The gradual improvements from Eqs. (17′) and (18′), and finally to Eq. (19′) are illustrated for in Appendix B.
A. Bounding the number of shift-symmetric configurations
In Sec. III, we derived closed and increasingly efficient formulas for counting the number of shift-symmetric configurations in a square lattice . To get a deeper and more qualitative insight, we now bound this number from the top and the bottom by exponential functions. We prove that the lower bound is tight on prime lattices (example in Fig. 7), whereas local maxima are reached on even ones (Fig. 6).
Number of shift-symmetric two-dimensional binary () configurations for the lattice sizes to with an inset focused on the area to . Note the local minima for prime and local maxima for even sizes.
Number of shift-symmetric two-dimensional binary () configurations for the lattice sizes to with an inset focused on the area to . Note the local minima for prime and local maxima for even sizes.
All binary shift-symmetric configurations for the lattice size of grouped into 5 classes based on the generating vector(s). The vectors are from left to right: and the one at the bottom containing all of them. The arrows show allowed transitions. Note that for prime-size binary lattices .
All binary shift-symmetric configurations for the lattice size of grouped into 5 classes based on the generating vector(s). The vectors are from left to right: and the one at the bottom containing all of them. The arrows show allowed transitions. Note that for prime-size binary lattices .
More precisely, for any , can be bounded as
where equality holds if and only if is a prime.
For an upper bound, let be the prime factorization of , where , the number of distinct prime factors of . Then
Note that our bound is significantly lower than the bound found by Castillo-Ramirez and Gadouleau.12 Also recall that they addressed a more general problem of counting aperiodic configurations on an arbitrary group.
By combining the inequalities (21′) and (22′), the number of shift-symmetric configurations satisfies
B. Probability of selecting shift-symmetric configuration over uniform distribution
To calculate the probability that a randomly drawn configuration is shift-symmetric, we first handle a uniform distribution, in which each symbol from for in configuration is equally likely. For nonsymmetric tasks, this probability directly equals a least expected insolvability (or error lower bound).
Overall, there exist configurations and each configuration is equally likely, hence the probability of selecting a shift-symmetric configuration in a square lattice of size over uniform distribution is . Further, by applying the inequality (23) and knowing that , we can bound the probability as
As exemplified in Fig. 8 and mathematically rooted in inequality (24), the probability decreases rapidly: square-exponentially by or exponentially by the lattice size . Since depends on the prime factorization of the probability is nonmonotonous. Similar to the probability reaches local minima for prime and local maxima for even lattices ().
Probability of selecting a shift-symmetric two-dimensional binary () configuration using uniform distribution for the lattice sizes to with an inset focused on the area to . Note the local minima for prime and local maxima for even sizes ().
Probability of selecting a shift-symmetric two-dimensional binary () configuration using uniform distribution for the lattice sizes to with an inset focused on the area to . Note the local minima for prime and local maxima for even sizes ().
IV. ENUMERATING SHIFT-SYMMETRIC CONFIGURATIONS FOR ACTIVE CELLS
Having enumerated “all” shift-symmetric configurations we now tackle a subproblem of enumerating configurations with a specific number of cells in a given state, such as the state “active.” The motivation behind this endeavor is to calculate the probability of selecting a shift-symmetric configuration generated by a density-uniform distribution.
We first define a set of shift-symmetric configurations with cells in a special state . Formally, for any state and , we define to be the set of all square configurations with exactly sites in state
where denotes the number of cells in a configuration that are in a state . Accordingly, let be the set of such configurations that are symmetric:
and for any , let denote the set of configurations in that are generated by so that
As a direct corollary, for any , any , and ,
To launch our enumeration endeavor, we focus first on shift-symmetric configurations of a single generating vector. For any , any , and such that divides
To derive the counting formulas for the specifics of -active-cell configurations, we mimic the advancements of the three counting techniques based on mutually-independent generators for from Sec. III, but this time, we root them into Eq. (29′).
As before we start with a base formula. Pick with and let . Let , , and be the prime factorizations of , , , respectively. Then, for any ,
where and
Similar to Eq. (18′) from Sec. III, the following alternative counting method is more efficient than the core Eq. (30′) due to the grouping of the exponential elements.
where and has the th coordinate
At last, as a parallel to Eq. (19′), we derive the final formula, which further simplifies the counting mechanics by collapsing the inner binomial sum to a simple expression .
where and
As a special case, it can be shown that the number of “binary” symmetric configurations () with sites in state is
For illustration purposes, an example of the three increasingly more compact counting formulas is given for and in Appendix B.
A. Probability of selecting shift-symmetric configuration over density-uniform distribution
Besides a uniform distribution, a CA’s performance is commonly evaluated using a so-called density-uniform distribution, in which the probability of selecting active cells (), a “density,” is uniformly distributed. Since for a density there exist configurations and each density is equally likely, the probability of selecting a shift-symmetric configuration in a lattice over a density-uniform distribution is then
As presented in Fig. 9, the probability for density-uniform distribution decreases a magnitude slower than for the uniform one and reaches even for . That is due to the fact that density-uniform distribution selects configurations with a few or many active cells, which are combinatorially more symmetric, more often.
Probability of selecting a shift-symmetric two-dimensional binary () configuration using density-uniform distribution for the lattice sizes to with an inset focused on to .
Probability of selecting a shift-symmetric two-dimensional binary () configuration using density-uniform distribution for the lattice sizes to with an inset focused on to .
V. SHIFT-SYMMETRIC CONFIGURATION DETECTION
For practical reasons, e.g., to test whether a current system’s configuration is shift-symmetric, and if yes take an action (restart), we provide an algorithm to effectively detect an occurrence of shift-symmetry.
First, to find out whether a configuration is shift-symmetric by a shift we start at a corner cell and check if all the cells at the orbit are in the same state. If yes, we repeat this process for the next orbit and so on, moving in an arbitrary but fixed order (e.g., left-right up-down), until we check all the cells. If a cell has been visited before we skip it and move on until we find an unvisited cell, which marks a start of the next orbit. Also, if the test fails at any point, a configuration is nonshift-symmetric (by ), and the process can be terminated. Otherwise, the property holds for all the cells and a configuration is shift-symmetric.
To determine whether a configuration is shift-symmetric globally, a naive way would be to try all possible nonzero vectors and check if any of them passes the aforementioned procedure. Luckily, as we discovered in Sec. II each configuration shift-symmetry “overlaps” with mutually-independent generators from . Recall that these generators are defined by prime factors and their total number is significantly smaller than .
In the worst case, the shift-symmetry test needs to visit all cells and there are vectors to try. Since and , also known as the integer logarithm, is at most , the worst-case time complexity is
Similarly, with a slightly more complicated proof, we can show that the average-case time complexity of the shift-symmetry test for a configuration generated from a uniform distribution is
Note that the worst-case and average-case time complexity of and , respectively, translate to and linear when interpreted by the optics of the number of cells . The function , which plays a crucial role in both O formulas, is of a logarithmic nature in “most of the cases,” but for primes. Since the number of primes is infinite, we could not use any tighter asymptote than . However, for randomly chosen the expected time complexities drop to just and , respectively.
It is worth mentioning that the presented algorithm detects “if” a configuration is shift-symmetric but does not count the number of shift-symmetries in a configuration. The validity of the detection holds because we know that “any” shift-symmetric configuration must obey at least one of the prime generators from . Nevertheless, to determine the number of shift-symmetries, i.e., the number of vectors with distinct vector spaces in for which the cells at a same orbit share the same state, we would need to consider also subvectors, whose satisfiability cannot be generally inferred from the prime generators. Construction of a “counting” algorithm is addressable but goes beyond the scope of this paper.
VI. DISCUSSION AND CONCLUSION
Shift-symmetry, as we illustrated in the paper, decreases the system’s computational capabilities and expressivity, and is generally good to be avoided. For each shift-symmetry, a system falls into, a configuration folds by the order of symmetry and “independent” computation shrinks to a smaller, prime fraction of the system. The rest is mirrored and lacks any intrinsic computational value or novelty. The number of reachable configurations shrinks proportionally as well.
One of the key aspects of shift-symmetry is that it is maintained (irreversible) for any number of states, and any uniform transition and neighborhood functions. It means that the occurrence of shift-symmetry is rooted in the CA model itself, specifically, in the cells’ uniformity, synchronous update, and toroidal topology. Shift-symmetry is preserved as along as a transition function is uniform (shared among the cells), even if nondeterministic. In other words, during each step, a transition function can be discarded and regenerated at random. However, within the same synchronous update it must be consistent, i.e., two cells whose neighborhood’s subconfigurations are the same must be transitioned to the same state.
We showed that a nonshift-symmetric solution is unreachable from a shift-symmetric configuration. Even more, a shift-symmetric configuration cannot be reached from another shift-symmetric one, if the vector space defining the symmetries of the starting configuration is not a subset of the target configuration's vector space. This renders the tasks, such as leader election,6,56 several image processing routines including pattern recognition,49 and encryption,60 insolvable by uniform CAs in a general sense. These procedures are fundamental for many distributed protocols and algorithms. Additionally, leader election contributes to decision making of biological societies18,38 and is a key driver of cell differentiation37,44 responsible for their structural heterogeneity and specialization.
To determine how likely a configuration randomly generated from a uniform distribution is shift-symmetric, hence insolvable, we efficiently enumerated and bounded the number of shift-symmetric configurations using mutually-independent generators. We also introduced a lower, tight prime-size bound, and an upper bound, and showed that even-size lattices are locally most likely shift-symmetric. By specializing on Cartesian powers of cyclic groups (two-dimensional case), we obtained more effective counting and probability formulas and sharper bounds compared to the state-of-the-art work addressing the problem for general groups.12,25 We also extended our machinery to a fixed number of active symbols and derived a probability formula for density-uniform distribution.
Overall, shift-symmetry is not as rare as one would think, especially for small or nonprime lattices, or when a configuration is generated using density-uniform distribution. Asymptotically, the probability for uniform distribution drops exponentially with the lattice size but a magnitude slower for a density-uniform distribution. For instance, the probability for a square lattice is around using uniform and using density-uniform distribution. Importantly, shift-symmetry does not necessarily have to be harmful for all the tasks. For instance, the density classification,15,20,43,48 which is widely used as a CA benchmark problem, requires a final configuration to be either if the majority of cells are initially in the state , and otherwise. Since the expected homogeneous configurations are fully shift-symmetric, they can be reached potentially from any configuration. Naturally, that depends on the structure of a transition function but shift-symmetry does not impose any strong restrictions here. The ability of reaching a “valid” answer does not necessarily mean reaching a “correct” answer. However, for the density classification, shift-symmetry tolerates the latter as well. It is because a shift-symmetric configuration consists purely of repeated subconfigurations, and so the density (ratio of ones) in a subconfiguration is the same as in the whole.
To detect whether a configuration is shift-symmetric we constructed an algorithm, which, by using the base prime generators, can effectively determine the presence of shift-symmetry in linear time for prime and just for randomly chosen on average.
By moving from one to two dimensions, we generalized our machinery to vector translations, which can be extended to the -dimensional case.11 It is expected that the number of shift-symmetric configurations will grow with the dimensionality of lattice. It will be interesting to investigate this relation from the perspective of prime-exponent divisors.
An important implication of shift-symmetry is that cyclic behavior must occur only within the same symmetry class defined by a set of prime shifts (vectors) as illustrated in Fig. 7. Note that we count no-symmetry as a class as well. This leads to the realization that once a CA gains a symmetry, i.e., a configuration crosses symmetry classes, it cannot be injective and reversible, and there must exist a configuration without a predecessor, a so-called “Garden of Eden” configuration.1,34 It means that the only way for the CA to stay injective is to decompose all the configurations into cycles, each fully residing in a certain shift-symmetry class. Again, one large class would contain all the nonshift-symmetric configurations. Open question is for which lattices, i.e., for how many shift-symmetric configurations, CAs are noninjective, thus irreversible, on average. As opposed to our shift-symmetric endeavor, which applies to any transition function, investigating injectivity would require to assume something about the transition function, e.g., that is generated randomly. Trivially, for any lattice, there always exists an injective transition function. An example is an identity function.
As we proved, the number of symmetries in any synchronous toroidal CA is nondecreasing. A natural question is: could it be increasing in the “average” case for a random transition function? We know that the expected behavior of randomly generated CA is most likely chaotic and the attractor length is exponential to the lattice size , as opposed to ordered or complex CAs with linear or quadratic attractors.66 Would the length of attractor be sufficient to discover a shift-symmetry if we keep a random CA running long enough, potentially time steps? As seen in Fig. 8, the ratio of shift-symmetric configurations assuming a uniform distribution is exponentially decreasing with the lattice size, and prime lattices could produce “only” around symmetric configurations. For a randomly chosen lattice size, dimensions, and cell connectivity, we expect the number of reachable symmetries to be significantly smaller than the total number of symmetries available. However, for symmetry-rich lattices, we speculate that toroidal synchronous uniform systems, such as CAs, could undergo “spontaneous symmetrization” contracting an initial configuration to a fully homogeneous state (analogical to Big Crunch). If proven, it would directly imply the system’s noninjectivity and irreversibility, and would bind symmetrization with “nonergodicity.” This hypothesis will be addressed in our future work.
We suggest that several phenomena observed in CA dynamics, such as irreversibility, emergence of structured “patterns,” and self-organization could be explained or contributed to shift-symmetry. As demonstrated by Wolfram62 on 256 elementary one-dimensional CAs, when run long enough, most of these CAs condensate to ordered structures: homogeneous configurations and self-similar patterns, which are in fact shift-symmetric.
A straightforward way to fight symmetry would be to introduce noise, i.e., to break the uniformity of cells and/or to use an asynchronous update. Based on the amount of noise, this could, however, disrupt the consistency of local, particle-based, interactions, which give rise to a global computation. Clearly, asynchronicity makes a system more robust but sacrifices the information processing by “algebraic” structures, which could exist only due to synchronous update.
Practical utility of the presented enumeration formulas and probability calculations for a given distributed application is that, we can minimize a likelihood of shift-symmetry-caused insolvability as well as the number of resources needed. An online supplementary web page, which implements these formulas as well as an embedded simulator to run a CA on a shift-symmetric configuration, can be found at https://coel-sim.org/symmetry.
ACKNOWLEDGMENTS
This material is based upon work supported by the National Science Foundation (NSF) under Grant Nos. 1028120, 1028378, and 1518833 and by the Defense Advanced Research Projects Agency (DARPA) under Award No. HR0011-13-2-0015. The views expressed are those of the author(s) and do not reflect the official policy or position of the Department of Defense or the U.S. Government. Approved for Public Release, Distribution Unlimited.
APPENDIX A: PROOFS
Note: lemmas, theorems, and corollaries are numbered such that those starting with E correspond to the equations in the main text which they are referenced from [e.g., Lemma E.4 Eq. (4′)]. The remaining nonequation-referenced (auxiliary) lemmas have the A prefix.
For any nonzero , the following hold
.
. ,
.
(i). When is repeatedly applied to any cell in the lattice, an orbit is generated, consisting of cells that must share a common state for any configuration in . The number of distinct orbits of cells in the lattice is simply . Any configuration in is thus uniquely determined by choosing a state from for each orbit of cells, so (i) follows.
If then for any uniform global transition rule .
(). By way of contradiction, suppose that and . Let such that . Then is symmetric under but not under . Consequently, there exists such that . But and by assumption, so Lemma A.1 implies that , which is a contradiction.
For any prime that divides and any , the cyclic group is simple, i.e., it has no nontrivial proper subgroups.
By Lemma E.4(ii), we see that has order , and by Lagrange’s theorem, any group with prime order is simple.
By swapping the coordinates, the proof applies also to each subgroup of the form .
(). Let , so that for some nonzero . It suffices to show that for some , since this fact, by Lemma E.10, implies and, therefore, .
Without loss of generality, we may assume . Otherwise, we simply divide everything by to obtain , and , respectively. Once we show that for some , we multiply throughout by to obtain the desired result.
(). Immediate by Definition [Eq. (11)].
First, suppose that and , where . By Lemma E.4(i), and . Since must divide both of these primes, the line (⋆) must hold as claimed.
Next, suppose and write for some . Suppose and for some . If then such that . But then so and thus . But also, , so that . Since , this forces , so that and (⋆) must hold as claimed.
Finally, suppose and suppose and for some . If then such that . But then so and thus . But also, , so that and, therefore, . Now and (⋆) must hold as claimed.
(). First suppose and for some . Then and . So as desired. A similar argument holds when and .
(). Again suppose and for some . Then . But and , so generates . Thus . Likewise, , so the desired containment holds. A similar argument can be made when and , showing that , which implies the desired result.
Now, because the content of is irrelevant and we care only about the cardinality , for each size we have ways of choosing elements from , which produces the final formula as required.
We prove it by induction on . As the induction basis, we choose , and so , where is a prime. Since we need to confirm it equals or for three different cases of defined by the function .
For , and , and for , and .
To finalize the proof we use .
Let . Then, the number of selections of state in , i.e., the pattern size, is . To enumerate the number of such configurations, we first have to choose out of sites to be in state , and then fill the remaining sites with states from .
Similar to the proof of Lemma E.18.
Similar to the proof of Theorem E.19.
For any state set and state , the set equals the set for the state set .
It is easy to show that these probabilities sum to , i.e., we must terminate at one of orbits. Further, the probability of successfully passing the test for all the orbits—the probability that a configuration generated from a uniform distribution is shift-symmetric by a vector with an order —equals .