Computational Hierarchy of Elementary Cellular Automata

Barbora Hudcova´1,2 and Toma´sˇ Mikolov2

1Charles University, Prague 2Czech Institute of Informatics, Robotics and Cybernetics, CTU, Prague

Abstract by Mazoyer and Rapaport (1999). We present the emulation relation between a pair of CA, and we demonstrate the re- The complexity of cellular automata is traditionally mea- sults on a toy class of elementary CA; namely, we present sured by their computational capacity. However, it is diffi- cult to choose a challenging set of computational tasks suit- their computational hierarchy. The results inspired us to de- able for the parallel nature of such systems. We study the fine a new notion of chaos for discrete dynamical systems ability of automata to emulate one another, and we use this connected to their computational capacity. notion to define such a set of naturally emerging tasks. We present the results for elementary cellular automata, although Introducing Cellular Automata the core ideas can be extended to other computational sys- tems. We compute a graph showing which elementary cel- A can be perceived as a k-dimensional lular automata can be emulated by which and show that cer- grid consisting of identical finite state automata with the tain chaotic automata are the only ones that cannot emulate same local neighborhood. They are all updated syn- any automata non-trivially. Finally, we use the emulation no- chronously in discrete time steps according to a fixed local tion to suggest a novel definition of chaos that we believe is suitable for discrete computational systems. We believe our update rule which is a function of the neighbors’ states. A work can help design parallel computational systems that are formal definition can be found in Kari (2005). Turing-complete and also computationally efficient. Basic Notions Introduction We say that Z is a one-dimensional cellular grid and we call its elements the cells. Let S be a finite set. An S- Discrete systems exhibit a wide variety of dynamical behav- configuration of the grid is a mapping c : Z → S, we ior ranging from ordered and easily predictable to a very write ci = c(i) for each i. We define the nearest-neighbors complex, disordered one. In this paper, we study cellular relative neighborhood of each cell i ∈ Z to be the triple automata (CA) that have intriguing visualizations of their (i − 1, i, i + 1). In this paper, we will study 1-dimensional space-time dynamics. Observing them helps us build intu- CA with nearest neighbors. Each such CA is character- ition for distinguishing the different types of dynamics, as ized by a tuple (S, f) where S is a finite set of states and studied by Wolfram (2002). Informally, complex CA pro- f : S3 → S is a local transition rule of the CA. The global duce higher-order structures, whereas the space-time dia- rule of the CA (S, f) operating on an infinite grid is a map- grams of chaotic CA are seemingly random. Though CA ping F : SZ → SZ defined as: dynamics has been studied extensively (Wolfram (1984), arXiv:2108.00415v1 [cs.NE] 1 Aug 2021 Kurka˚ (2009), Wuensche and Lesser (2001), Gutowitz F (c)i = f(ci−1, ci, ci+1). (1990), Zenil (2009)), it is still a very difficult problem to formally define the notions of complexity and chaos in CA. For practical purposes, when observing the CA simula- Traditionally, complexity of CA is studied through their tions, we consider the grid to be of finite size with a periodic computational capacity (Toffoli (1977), Cook (2004)), boundary condition. In such a case, we compute the cells in whereas chaos is studied via topological dynamics (Devaney the relative neighborhood modulo the size of the grid. (1989)). As the two approaches are not connected in any obvious way, it is an interesting open problem of whether Elementary CA Elementary cellular automata (ECA) are chaotic CA can compute non-trivial tasks (Martinez et al. 1D nearest-neighbors CA with states S = {0, 1}. We iden- (2013)). tify each local rule f determining an ECA with the Wolfram In this paper, we study the complexity of CA through number of f defined as: their computational capacity; namely, we study their abil- ity to emulate one another; this notion was first introduced 20f(0, 0, 0)+21f(0, 0, 1)+22f(0, 1, 0)+...+27f(1, 1, 1). We will refer to each ECA as a “rule k” where k is the corre- CA Emulations sponding Wolfram number of its underlying local rule. The Basic Notions class of ECA is a frequently used toy model for studying Definition 1 (Subautomaton). different CA properties due to its relatively small size; there Let ca1 = (S, f), ca2 = (T, g) be two nearest-neighbor 1D are only 256 of them. CA. We say that ca is a subautomaton of ca if there exists n 1 2 For an ECA operating on a cyclic grid of size with a one-to-one encoding e : S → T such that global rule F we define the trajectory of a configuration n 2 u ∈ {0, 1} to be (u, F (u),F (u),...). The space-time di- e(f(s1, s2, s3)) = g(e(s1), e(s2), e(s3)) agram of such a simulation is obtained by plotting the con- 3 figurations as horizontal rows of black and white squares for all (s1, s2, s3) ∈ S . (corresponding to states 1 and 0) with time progressing This simply means that we can embed the rule table of downwards. ca1 into the rule table of ca2; the definition is equivalent to saying that (S, f) is a subalgebra of (T, g). CA Complexity via Computational Capacity Example 2. For an ECA ca = ({0, 1}, f), we define the Classically, the complexity of a CA is demonstrated by its dual ECA ca0 = ({0, 1}, f 0) as computational capacity. Intuitively, we believe that CA ca- 0 pable of computing non-trivial tasks should be more com- f (b1, b2, b3) = 1 − f(1 − b1, 1 − b2, 1 − b3). plex than those that are not. In the past, many different com- 0 putational problems were considered, such as the majority f simply changes the role of 0 and 1 states. The encoding e(b) = 1−b, b ∈ {0, 1} witnesses that ca is a subautomaton computation task (Mitchell et al. (2000)) or the firing squad 0 synchronization (Mazoyer (1986)), a detailed overview was of ca and vice versa. written by Mitchell (1998). Nevertheless, the most classi- 0 10 20 30 40 0 10 20 30 40 cal task is the simulation of a computationally universal sys- 0 0 tem (a Turing machine, a tag system, etc.). Over the years, 10 10 many different CA were designed or showed to be Turing 20 20 complete. However, it seems unnatural to demonstrate the 30 30 40 40 complexity of an inherently parallel system by embedding a 50 50 sequential computational model into it. In our opinion, an ideal set of benchmark tasks helping us determine the com- putational capacity of CA should Figure 1: Space-time diagram of ECA on the left and its dual rule 137 on the right. • consist of tasks suitable for the parallel computational en- vironment Each ECA contains at most two subautomata from the • be challenging enough ECA class: itself and its dual ECA. Hence, the subautoma- ton relation would not produce a rich hierarchy. It is, how- • for a given CA and a task T , it should be effectively veri- ever, a key concept for defining the CA emulation. Below, fiable whether the CA can compute T . we restrict the terminology to ECA, but the theory can be For a fixed class C of CA, a natural task is the following: generalized to any 1D CA in a straightforward way. + S∞ k Given a CA in C, how many other CA in C can it simulate? We will write 2 = {0, 1} and define 2 = k=1 2 to be the set of all finite nonempty binary sequences. The key problem is finding a suitable definition of CA ”sim- Definition 3 (Unravelling a Boolean function). ulating” one-another. Various approaches have been sug- 3 + + gested — simulations can be interpreted via CA coarse- Let f : 2 → 2. We define fe : 2 → 2 as grainings (Israeli and Goldenfeld (2006)), or through em- fe(b1, b2, . . . , bn) = f(b1, b2, b3) . . . f(bn−2, bn−1, bn) bedding a local rule to larger size cell-blocks (Mazoyer and Rapaport (1999), Ollinger (2001)). Many interesting the- for any binary sequence b1b2 . . . bn, n ≥ 3. oretical results stem from such definitions. For instance, By fek we simply mean the composition Ollinger (2001) defined a CA simulation notion which ad- mits a universal CA — one that is able to simulate all other fek = fe◦ fe◦ ... ◦ fe. | {z } CA with the same dimensionality; it was designed by Cu- k−times lik II and Albert (1987). In this paper, we consider a notion very similar to the one suggested by Mazoyer and Rapaport Each iteration of feshortens the input size by 2, therefore we (1999). Compared to their definition, ours is stricter and, can notice that when we restrict the domain of fek we get thus, slightly easier to verify. We call it CA emulation and k k k k k introduce it in the subsequent section. fe : 2 × 2 × 2 → 2 . 23k Hence, fek can be interpreted as a ternary function operating Properties of the Emulation Relation on supercells of k bits and we obtain a CA (2k, fek) whose Preservation of Turing Completeness dynamics is completely governed by the simple local rule f. Lemma 6. Suppose that (2, f) ≤ (2, g) with a witnessing Therefore, each ECA (2, f) gives rise to a series of CA k encoding enc. Then, for each configuration c ∈ 2l, l ≥ 3, it holds that enc(f(c)) = gk(enc(c)). 2 2 3 3 4 4 e e (2, f), (2 , fe ), (2 , fe ), (2 , fe ),... l l−2 3 Proof. Let c ∈ 2 for some l ≥ 3. Then, fe(c) ∈ 2 , and Example 4. Suppose we have f : 2 → 2, f(b1, b2, b3) = enc(fe(c)) is a sequence of length l − 2, each of its elements b1 ⊕ b2 ⊕ b3, where ⊕ is the XOR operation. In Figure 2 we 2 being a binary k-tuple. Below, we show that for each 1 ≤ show the diagram of fe computation. k i ≤ l − 2 it holds that enc(fe(c))i = ge (enc(c))i.

fe2 enc(fe(c))i = enc(fe(c)i)

= enc(f(ci−1, ci, ci+1)) Figure 2: Diagram of f 2 computing on supercells of size 2. k e = ge (enc(ci−1), enc(ci), enc(ci+1)) k = ge (enc(c))i. Let e : S → T be a mapping between some finite sets. We define e : S+ → T + simply as Using the previous result it can easily be shown that for e(s1, s2, . . . , sn) = e(s1), e(s2), . . . , e(sn) each t ∈ N and for each c ∈ 2+ sufficiently long it holds that: for each s1, . . . , sn ∈ S, n ∈ N. t kt enc(fe (c)) = ge (enc(c)) (2) Definition 5 (ECA Emulation). We say that ca1 = (2, f) simply using induction on t. can be emulated by ca2 = (2, g) with a supercell size k, if k k Therefore, if (2, f) ≤ (2, g) then the diagram (1) com- ca1 is a subautomaton of (2 , ge ). In such a case, we write k mutes for arbitrarily long configurations and for arbitrar- ca1 ≤k ca2. ily many iterations of the functions fe and gk. Therefore, Hence, (2, f) ≤ (2, g) holds if and only if there exists a e k any space-time diagram produced by ca = (2, f) can one-to-one encoding 1 be efficiently encoded by enc to a space-time diagram of ca = (2, g). Hence, if ca is Turing complete, ca must be enc : 2 → 2k 2 1 2 also. such that for any initial configuration c ∈ 23 it holds that Emulation Relation Is a Preorder Clearly, for each ca it k ca ≤ ca ≤ enc(f(c)) = ge (enc(c)). holds that 1 . Hence, is reflexive. Lemma 7. The relation ≤ is transitive. We call such encoding the witnessing encoding. In other words, the following diagram commutes. Proof. Suppose that (2, f) ≤k (2, g) with witnessing en- coding ϕ and (2, g) ≤l (2, h) with witnessing encoding ψ enc for some k, l ∈ . We define enc = ψ ◦ ϕ : 2 → 2kl. Then, 3 (2k)3 N 2 for any configuration c ∈ 23 we have that: f ◦ k ge enc(f(c)) = ψ(ϕ(f(c))) enc k = ψ(gk(ϕ(c))) 2 2 (1) e = ehkl(ψ ◦ ϕ(c)) We say that ca can be emulated by ca if there exists 1 2 = ehkl(enc(c)). some k for which ca1 ≤k ca2, and we write ca1 ≤ ca2. If ca1 ≤1 ca2 we say that ca2 emulates ca1 trivially. If In the third equality we use the result from (2). ca ≤k ca for k > 1 we say that the ca is self-similar. In the next section, we give some simple proofs of the key Hence, ≤ is transitive and therefore, a preorder. properties of the ≤ relation. Namely, we prove that ≤ is In contrast, Mazoyer and Rapaport (1999) define that a preorder and that whenever ca1 ≤ ca2 and ca1 is Turing (2, f) can be emulated by (2, g) if there exist k, l ∈ N such k k l l complete, then ca2 is also Turing complete. that (2 , fe ) is a subautomaton of (2 , ge ). They present much deeper theoretical results about the notion in their pa- Algorithm 2: Subalgebra algorithm computing all per. In contrast, we concentrate on explicitly computing ca1 for which ca1 ≤k ca2. which ECA can emulate which to form their computational Input : ca2 = (2, g), supercell size k hierarchy and discuss the results. Output: all ca1 = (2, f) together with a witnessing enc such that ca1 ≤k ca2 k Emulations as Subalgebras For each ECA (2, g) we have 1 for u, v ∈ 2 2 do a sequence of algebras: k k 3 {u, v} is a valid sublagebra of (2 , ge ); 2 2 3 3 4 4 4 for i, j, k ∈ {u, v} do (2, g), (2 , g ), (2 , g ), (2 , g ),... k e e e 5 if ge (i, j, k) 6∈ {u, v} then 6 {u, v} is not a valid subalgebra; k k It holds that (2, f) ≤k (2, g) if and only if (2 , ge ) con- 7 break tains a two-element subalgebra isomorphic to (2, f); the 8 end witnessing encoding being the corresponding algebra homo- 9 end morphism. 10 if {u, v} is a valid sublagebra then 11 put enc(0) = u, enc(1) = v; Israeli and Goldenfeld (2006) have defined a different no- −1 k tion of CA simulation called the CA coarse-graining. It is 12 determine f for which f = enc ◦ ge ◦ enc; 13 save (f, enc) interesting to notice that their notion is dual to the CA em- 14 end ulation we have defined in this paper. More specifically, the 15 end CA coarse-graining directly corresponds to the congruences of algebras. Namely, (2, g) can be coarse-grained into (2, f) if and only if there exists some k ∈ such that (2, f) is iso- N The time complexity with respect to the supercell size k morphic to some quotient algebra of (2k, gk). e is in O(k · 22k) for both algorithms. However, Algorithm The interpretation of CA emulation as subalgebras comes 1 needs to iterate over all ECA to compute the same result in handy when developing an effective algorithm for com- as Algorithm 2. Experimentally, we have indeed observed puting the ≤ for a given supercell size k. k that Algorithm 1 takes approximately 250 times longer than Emulation Computing Algorithm Algorithm 2 to compute the emulated automata. Checking whether ca1 ≤k ca2 gets infeasible for large k. Emulation Hierarchy of ECA In this section, we present an algorithm computing the ≤k relation for a given k and compare it to the “naive” algorithm In this section, we present a computational hierarchy based in terms of efficiency. on the emulation relation. We were able to compute ≤k for supercell size k ranging from 1 to 11 due to the computa- tional limitations. Algorithm 1: Naive algorithm checking whether In Example 2 we have seen that for ca = (2, f) and its ca1 ≤k ca2. 0 0 0 0 dual ca = (2, f ) it holds that ca ≤1 ca and ca ≤1 ca. Input : ca1 = (2, f), ca2 = (2, g), supercell size k Thus, ≤1 is an equivalence relation on the set of ECA, Output: a witnessing enc if ca1 ≤k ca2; 0 ”cannot emulate” message otherwise each class containing exactly f and its dual f (those might k 1 for enc(0), enc(1) ∈ 2 coincide for some rules). From the transitivity of ≤ we 2 do know that ca can emulate (and be emulated by) exactly the 3 encoding is valid; same rules as ca0. Using a simple program, we obtained 4 for i, j, k ∈ 2 do k 136 different ECA equivalence classes given by ≤1. In 5 if enc(f(i, j, k)) 6= g (enc(i, j, k)) then e the following text, we will identify each equivalence class 6 encoding is not valid; 7 break with the ECA it contains having the smaller Wolfram 8 end number. We show the hierarchy for such representa- 9 end tives and for supercells of size k ranging from 2 to 11. 10 if encoding is valid then Specifically, whenever we found that ca1 ≤k ca2 for some 11 return enc k ∈ {2, 3,..., 11} we represent it by the following diagram. 12 end

13 end ca1 14 return ”cannot emulate”;

ca2 The naive algorithm simply goes through all possible en- Many ECA are capable of emulating simple rules, such as codings to determine whether ca1 ≤k ca2. The subalgebra rule 0 or the identity rule 204. Adding so many edges to the k k algorithm computes all two-element subalgebras of (2 , ge ) diagram would make it unreadable. Hence, we present the and thus, determines all ca1 for which ca1 ≤ ca2. hierarchy in three parts. Main Part of the Hierarchy: 41 97

6 20 56 57 98 148 134

184 176 162

16, 24, 80, 2, 10, 66, 154, 113, 82, 43, 180 112, 116, 9, 13, 7, 21, 65, 1, 5, 29, 42, 46, 172, 212, 81, 53, 142, 11 144, 208, 224 69, 168 37 130, 138 26, 27 216

100 44 54 14 52, 88 38, 74 188 84 152 94 28 156 70 33 36 104 72 108

68 12 50 102 34 15 48 85 192 136 200 132 4 76

30 45 86 89

Figure 3: Emulation Hierarchy of ECA computed for supercell sizes ranging from 2 to 11; main part of the diagram. Some edges are depicted in light gray purely for better understandability. A looped arrow marks self-similar rules.

Frequently Emulated Rules:

2, 6, 10, 11, 14, 20, 25, 6, 9, 11, 14, 15, 16, 20, 1, 4, 5, 12, 13, 18, 19, 22, 6, 11, 14, 20, 23, 32, 33, 26, 27, 34, 35, 37, 38, 24, 37, 41, 43, 48, 49, 23, 28, 29, 33, 36, 37, 44, 15, 30, 45, 51, 37, 40, 41, 43, 50, 54, 56, 40, 41, 42, 43, 46, 54, 56, 52, 53, 54, 56, 57, 61, 80, 50, 51, 54, 62, 68, 69, 70, 5, 19, 23, 28, 60, 85, 86, 89, 57, 58, 77, 81, 84, 96, 97, 57, 58, 65, 66, 74, 81, 84, 81, 82, 84, 88, 96, 97, 98, 72, 73, 76, 77, 78, 92, 94, 29, 50, 51, 90, 102, 105, 98, 104, 113, 114, 122, 85, 97, 98, 106, 113, 130, 112, 113, 114, 116, 120, 100, 104, 108, 110, 118, 54, 70, 73, 94, 106, 120, 150, 128, 130, 132, 134, 142, 134, 138, 142, 148, 154, 134, 142, 144, 148, 152, 122, 124, 126, 132, 140, 108, 156, 178 154, 170, 180, 144, 148, 160, 162, 164, 162, 168, 170, 172, 184, 176, 180, 184, 208, 212, 146, 156, 164, 172, 178, 204, 240 168, 176, 178, 184, 212, 188, 212 216, 224, 240 196, 200, 204, 216, 232 224, 232

170 240 204 51 0 128

costant 0 shift of 1 bit to the left shift of 1 bit to the right identity negation rules not capable ternary AND of emulating 0 with supercell sizes 2 to 11 are depicted

Figure 4: Emulation Hierarchy of ECA computed for supercell sizes ranging from 2 to 11, this part shows the most frequently emulated rules.

Emulated Linear Rules: 22

18, 26, 82, 94, 122, 146 105 126, 154, 164, 180

90 150 60

Figure 5: Emulation Hierarchy of ECA computed for supercell sizes ranging from 2 to 11, this part shows rules emulating particular linear ECA. Main Part For compactness, we often show multiple rules Jen (1999) has shown that the nonlinear rules 18, 126, and in the same node in Figure 3. However, that does not imply 146 can be mapped onto the linear . Figure 5 agrees that such rules can emulate one another. Rules in one node with the results and further shows other nonlinear rules with are emulated and can emulate exactly the same rules con- this property which makes them interesting candidates for tained in the main part in Figure 3. However, they do not further algebraic studies. necessarily emulate the same trivial or linear rules in Fig- ures 4 and 5. Therefore, we note that rules in the same node Bottom Part of the Hierarchy do not necessarily have an identical computational capacity.

A task frequently studied in the CA environment is to de- Top and Bottom of the Emulation Hierarchy termine the majority of 0’s and 1’s in the input configuration. ECA rules Number of rules they can emulate 41, 97 9 The strict version of the task requires the CA to enter a ho- 6, 20, 54, 57, 134, 148 7 Top mogenous state of all 0’s or all 1’s to indicate the result. It 14, 37, 56, 84, 94, 98, 156 6 0, 3, 8, 17, 60, 64, 90, 102, 105, 106, has been shown that no ECA can solve this strict version. If 1 120, 150, 170, 204, 240 Bottom we relax the requirements on the form of the output, Cap- 30, 45, 86, 89 0 carrere et al. (1996) have shown that solves the ma- jority task exactly. From the main part of the hierarchy, we Table 1: ECA Rules at the Top and Bottom of the Emulation can see that by encoding the input configuration in a simple Hierarchy computed for supercells of size 1 to 11. way, at least nine more ECA and their dual rules can solve the task. There are exactly four rules (and their duals) that seem to be unable to emulate any ECA non-trivially (i.e., with a

0 20 40 60 80 0 supercell size larger than one). Rule 86 is obtained from by changing the role of the “left and right neighbor”. 10 Rule 89 is obtained in the same way from the dual of rule 20 45. All the four rules seem to belong to the most disordered 30 ECA according to metrics such as the compression size of 40 space-time diagrams (Zenil (2009)) or the transient classifi- 50 cation (Hudcova´ and Mikolov (2020)). Due to the seemingly random patterns it produces, rule 30 was implemented as a Figure 6: Space-time diagram of ECA rule 184 on the left. pseudorandom number generator in Mathematica. The emulated computation by rule 148 showed on the right. It is interesting that the most chaotic ECA seem to be ex- The emulation uses supercells of size 2 and every second actly those unable to emulate any ECA non-trivially. To fur- time step is depicted. ther explore this, we asked whether the four chaotic CA can emulate any 1D nearest-neighbors CA non-trivially, not just the ECA. Frequently Emulated Rules The CA emulation offers a Let (S, f) be a CA. Since S is finite, there must exist natural definition of a CA supporting memory: we say that a some s ∈ S and k ∈ N such that fek(s, s, s, . . . , s) = s. CA has a capability of perfect memory if it can emulate the Hence, for any CA with one state ({q}, g) the encoding identity rule 204 (alternatively, we could also tolerate the enc : q 7→ (s, s, . . . , s) witnesses that (S, f) can emulate | {z } emulation of shifting rules or the negation). Hence, we have k−times a practical criterion for checking whether a given CA can ({q}, g). Therefore, any CA can emulate every CA with one support memory effectively, i.e., with a small supercell size. state. The question is whether the four CA can emulate any Rules, which cannot emulate either of the rules 51, 204, 170, CA with more than one state non-trivially. and 240 with the examined supercell sizes are: 0, 3, 7, 8, 17, We have examined the sequence of algebras 21, 22, 30, 32, 45, 60, 64, 86, 89, 90, 102, 105, 128, 136, 150, 160, 192. We can notice that they include trivial rules (2, f), (22, fe2), (23, fe3), (24, fe4),..., (211, fe11) (0, 3, 8, 128), linear rules (60, 90, 105, 150), as well as the chaotic rules (22, 30, 45, 86, 89). up to supercell size 11 for rules 30, 45, 86, and 89, and com- puted all their subalgebras, not only the two-element ones. Emulating Linear Rules We say an ECA is linear, if its We found out that all of the four CA only contain subalge- local rule f is a linear Boolean function; i. e., it satisfies bras with one element, hence, they cannot emulate any CA f(x + y) = f(x) + f(y) for all x, y ∈ 23. Such ECA can with more than one state for supercell sizes 2 to 11. be studied algebraically which lead to exact results describ- It remains an open problem whether this would hold for ing e.g., their transients or the structure of attractors (Martin supercells of arbitrary size. However, we can conclude that et al. (1984), Jen (1988)). if any of the four chaotic ECA can emulate any non-trivial automaton, it cannot do so effectively, i.e., with a supercell they are not computationally chaotic. As linear CA are self- of small size. similar, it follows that they are not computationally chaotic We note that analogous experiments were conducted for either. the coarse-graining relation. (Dzwinel and Magiera (2015)) From the results we presented, it follows that the only showed that the rules 30 and 45, together with their nega- ECA that could be computationally chaotic are rules 30 and tions, seem to be exactly those that cannot be coarse-grained 45, together with their symmetrical rules. Hence, we can non-trivially. These results motivate us to study chaos from form the following hypothesis. a computational perspective in the next section. Hypothesis 9. ECA rules 30 and 45 are computationally chaotic. Chaos In Cellular Automata Proving this result would imply that such rules cannot Intuitively, a chaotic CA has unpredictable dynamics and compute any task in the sense of CA emulation. seemingly random space-time diagrams with no apparent We note that the definition can be extended to CA in ar- higher-order structures forming. Below, we discuss exam- bitrary dimensions with various neighborhood shapes in a ples of formal definitions of chaos suggested in the past and straightforward way. We also note that the definition does propose a new one based on the CA emulation notion. not depend on whether the CA operates on a finite or infinite For discrete systems, chaos is classically studied through grid and is purely a property of its local rule. topological dynamics, and it is typically connected to the Most definitions of chaos in discrete systems are not re- system’s sensitivity to initial conditions (Devaney (1989), lated to their computational capacity. Hence, there is an Cattaneo et al. (1999)). Other studies of chaos in CA exam- interesting ongoing debate whether chaotic CA can com- ine e.g., their input entropy (Wuensche (1999)) or properties pute any non-trivial tasks. In contrast, the notion of com- of the local rule itself (Wuensche (2009)); a comprehensive putational chaos is strongly connected to the computational study of ECA, including their chaotic behavior, was intro- capacity of the CA. If a CA is computationally chaotic, it duced by Chua et al. (2007). cannot compute the dynamics of any other CA. Hence, we From a great review by Martinez (2013) one can see that might conclude that being computationally chaotic directly some definitions of chaos admit either the shift CA (Devaney implies the inability to compute a non-trivial task. (1989)) or linear CA (Cattaneo et al. (1999)) to be chaotic. In the first case, shifting a configuration by one bit does not Conclusion intuitively feel very unpredictable. For linear automata, it We studied the notion of CA emulation as a method of de- is known that they can be simulated on a computer signif- termining the computational capacity of CA. We showed icantly faster than general CA (Robinson (1987)). Hence, that the CA emulation relation forms a preorder on the ECA their dynamics can be predicted quite efficiently. Below, we class and presented an approximation of the emulation hier- propose a new, much stricter definition of chaotic behavior. archy produced by the preorder. We did notice that the most chaotic CA seem to be the minimal elements of the hierar- Definition 8. We call a 1D nearest-neighbors CA com- chy. This inspired us to introduce a new definition of chaos putationally chaotic if it cannot emulate any 1D nearest- in the CA environment. Our notion of chaos is novel be- neighbors CA with more than one state non-trivially. cause it is connected to the computational capacity of a sys- Proving that a particular CA is computationally chaotic tem. In contrast to previous concepts of chaos, our definition would, in principle, require verifying an infinite amount of does not regard linear and shifting automata as chaotic. This conditions and might require deep theoretical insight into the agrees with the results that the dynamics of such CA can be dynamics of the CA. However, it is useful as a new theoret- predicted more efficiently than for general CA. ical notion, which formalizes the unpredictability of a CA. The emulation relation can be defined for CA in any di- Indeed, if ca1 ≤k ca2 then for a subset of initial conditions, mension and with an arbitrary neighborhood. Though its the result of ca2 run for k time-steps is equivalent to sim- computation requires verifying infinitely many conditions, ply running ca1 for 1 time-step. Hence, at least some part we can compute it just for supercells of small size. Verify- of its dynamics can be predicted more effectively. In con- ing such small supercell values helps us determine whether trast, computationally chaotic CA cannot contain any sim- a CA can emulate any others effectively. pler CA as a substructure in its space-time dynamics. This A pair of ECA obtained by changing the role of their “left suggests that no part of its dynamics can be predicted effi- and right neighbor” has equivalent dynamics; however, the ciently. Hence, the definition seems to agree with the intu- emulation relation we presented is unable to discover such itive understanding of unpredictability. an equivalence. For this reason, it is meaningful to study In CA with trivial dynamics, structures tend to die out other possible definitions of a CA subautomaton. It would quite quickly. This enables such rules to emulate either the be very interesting to examine whether the different variants rule 0 non-trivially (this can be seen from Figure 4) or to of the definition would change the computational hierarchy be self-similar (e.g., rules 0, 240, or the shift rule). Thus, results significantly. As a possible application, we can use the method of CA Jen, E. (1999). Exact solvability and quasiperiodicity of one- emulation to construct Turing-complete CA without having dimensional cellular automata. Nonlinearity, 4:251. to give elaborate proofs of this fact. We would simply embed Kari, J. (2005). Theory of cellular automata: A survey. Theoretical a well-known Turing-complete CA into a newly constructed Computer Science, 334(1):3 – 33. CA with possibly much richer dynamics. It could be inter- esting to design a CA capable of emulating many different Kurka,˚ P. (2009). Topological dynamics of cellular automata. Cel- lular Automata. Encyclopedia of Complexity and Systems Sci- CA and study the dynamics of such a rich system. ence Series. Acknowledgements Martin, O., Odlyzko, A., and Wolfram, S. (1984). Algebraic prop- erties of cellular automata. Communications in Mathematical Our work was supported by Grant Schemes at CU, reg. Physics, 93. no. CZ.02.2.69/0.0/0.0/19_073/0016935, the Ministry of Education, Youth and Sports within the dedicated pro- Martinez, G. J. (2013). A note on elementary cellular automata gram ERC CZ under the project POSTMAN with ref- classification. Journal of cellular automata, 8. erence LL1902, by the Czech project AI&Reasoning Martinez, G. J., Seck Tuoh Mora, J., and Zenil, H. (2013). Com- CZ.02.1.01/0.0/0.0/15_003/0000466 and the European Re- putation and universality: Class iv versus class iii cellular au- gional Development Fund, by SVV-2020-260589, and is tomata. Journal of cellular automata. part of the RICAIP project that has received funding from Mazoyer, J. (1986). An overview of the firing squad synchroniza- the European Union’s Horizon 2020 research and innova- tion problem. Automata Networks, LITP Spring School on tion programme under grant agreement No. 857306. Theoretical Computer Science Proceedings, 316. Mazoyer, J. and Rapaport, I. (1999). Inducing an order on cellular References automata by a grouping operation. Discrete Applied Mathe- Capcarrere, M. S., Sipper, M., and Tomassini, M. (1996). Two- matics, 91(1):177–196. state, r = 1 cellular automaton that classifies density. Phys. Rev. Lett., 77:4969–4971. Mitchell, M. (1998). Computation in cellular automata: A selected review. Non-Standard Computation, pages 95–140. Cattaneo, G., Formenti, E., Margara, L., and Mauri, G. (1999). On the dynamical behavior of chaotic cellular automata. Theo- Mitchell, M., Crutchfield, J., and Das, R. (2000). Evolving cel- retical Computer Science, 217(1):31–51. lular automata with genetic algorithms: A review of recent work. First Int. Conf. on Evolutionary Computation and Its Chua, L. O., Guan, J., Sbitnev, V. I., and Shin, J. (2007). A nonlin- Applications, 1. ear dynamics perspective of wolfram’s new kind of science. part vii: Isles of eden. International Journal of Bifurcation Ollinger, N. (2001). Toward an algorithmic classification of cellu- and Chaos, 17(09):2839–3012. lar automata. LIP 222001-10, (2). Cook, M. (2004). Universality in elementary cellular automata. Robinson, A. (1987). Fast computation of additive cellular au- Complex Systems, 15. tomata. Complex Systems, 1(1):211–216. Culik II, K. and Albert, J. (1987). A simple universal cellular au- Toffoli, T. (1977). Computation and construction universality of tomaton and its one-way and totalistic version. Complex Sys- reversible cellular automata. Journal of Computer and System tems, 1:1–16. Sciences, 15(2):213 – 231. Devaney, R. L. (1989). An Introduction To Chaotic Dynamical Sys- Wolfram, S. (1984). Universality and complexity in cellular au- tems, Second Edition. Addison-Wesley advanced book pro- tomata. Physica D: Nonlinear Phenomena, 10(1):1–35. gram. Avalon Publishing. Wolfram, S. (2002). . Wolfram Media, Dzwinel, W. and Magiera, K. (2015). Irreducible elementary cel- Champaign, USA. lular automata found. Journal of Computational Science, 11:300–308. Wuensche, A. (1999). Classifying cellular automata automatically: Finding gliders, filtering, and relating space-time patterns, at- Gutowitz, H. A. (1990). A hierarchical classification of cellular tractor basins, and thez parameter. Complexity, 4:47–66. automata. Physica D: Nonlinear Phenomena, 45(1):136–156. Wuensche, A. (2009). Cellular automata encryption: the reverse Hudcova,´ B. and Mikolov, T. (2020). Classification of complex algorithm, z-parameter and chain-rules. Parallel Processing systems based on transients. Artificial Life Conference Pro- Letters, 19:283–297. ceedings, (32):367–375. Wuensche, A. and Lesser, M. (2001). The global dynamics of Israeli, N. and Goldenfeld, N. (2006). Coarse-graining of cellu- celullar automata: An atlas of basin of attraction fields of lar automata, emergence, and the predictability of complex one-dimensional cellular automata. J. Artificial Societies and systems. Physical Review E, 73(2). Social Simulation, 4. Jen, E. (1988). Linear cellular automata and recurring sequences Zenil, H. (2009). Compression-based investigation of the dynam- in finite fields. Communications in Mathematical Physics, ical properties of cellular automata and other systems. Com- 119:13–28. puting Research Repository - CORR, 19.