YES Termination w.r.t. Q proof of Strategy_removed_AG01_4.28.ari

(0) Obligation:

Q restricted rewrite system:
The TRS R consists of the following rules:

half(0) → 0
half(s(0)) → 0
half(s(s(x))) → s(half(x))
bits(0) → 0
bits(s(x)) → s(bits(half(s(x))))

Q is empty.

(1) QTRS Reverse (EQUIVALENT transformation)

We applied the QTRS Reverse Processor [REVERSE].

(2) Obligation:

Q restricted rewrite system:
The TRS R consists of the following rules:

0'(half(x)) → 0'(x)
0'(s(half(x))) → 0'(x)
s(s(half(x))) → half(s(x))
0'(bits(x)) → 0'(x)
s(bits(x)) → s(half(bits(s(x))))

Q is empty.

(3) RFCMatchBoundsTRSProof (EQUIVALENT transformation)

Termination of the TRS R could be shown with a Match Bound [MATCHBOUNDS1,MATCHBOUNDS2] of 1. This implies Q-termination of R.
The following rules were used to construct the certificate:

0'(half(x)) → 0'(x)
0'(s(half(x))) → 0'(x)
s(s(half(x))) → half(s(x))
0'(bits(x)) → 0'(x)
s(bits(x)) → s(half(bits(s(x))))

The certificate found is represented by the following graph.

The certificate consists of the following enumerated nodes:

2, 4, 6, 7, 8, 9, 14, 15, 16, 17

Node 2 is start node and node 4 is final node.

Those nodes are connected through the following edges:

  • 2 to 4 labelled 0'_1(0), 0'_1(1)
  • 2 to 6 labelled half_1(0)
  • 2 to 7 labelled s_1(0)
  • 4 to 4 labelled #_1(0)
  • 6 to 4 labelled s_1(0)
  • 6 to 14 labelled half_1(1)
  • 6 to 15 labelled s_1(1)
  • 7 to 8 labelled half_1(0)
  • 8 to 9 labelled bits_1(0)
  • 9 to 4 labelled s_1(0)
  • 9 to 14 labelled half_1(1)
  • 9 to 15 labelled s_1(1)
  • 14 to 4 labelled s_1(1)
  • 14 to 14 labelled half_1(1)
  • 14 to 15 labelled s_1(1)
  • 15 to 16 labelled half_1(1)
  • 16 to 17 labelled bits_1(1)
  • 17 to 4 labelled s_1(1)
  • 17 to 14 labelled half_1(1)
  • 17 to 15 labelled s_1(1)

(4) YES