(0) Obligation:

Clauses:

app1(.(X0, X), Y, .(X0, Z)) :- app1(X, Y, Z).
app1([], Y, Y).
app2(.(X0, X), Y, .(X0, Z)) :- app2(X, Y, Z).
app2([], Y, Y).
perm(X, .(X0, Y)) :- ','(app1(X1, .(X0, X2), X), ','(app2(X1, X2, Z), perm(Z, Y))).
perm([], []).

Query: perm(g,a)

(1) PrologToDTProblemTransformerProof (SOUND transformation)

Built DT problem from termination graph DT10.

(2) Obligation:

Triples:

app1A(.(X1, X2), X3, X4, .(X1, X5)) :- app1A(X2, X3, X4, X5).
app2E(.(X1, X2), X3, .(X1, X4)) :- app2E(X2, X3, X4).
permB(.(X1, X2), .(X3, X4)) :- app1A(X5, X3, X6, X2).
permB(.(X1, X2), .(X3, X4)) :- ','(app1cA(X5, X3, X6, X2), app2E(X5, X6, X7)).
permB(.(X1, X2), .(X3, X4)) :- ','(app1cA(X5, X3, X6, X2), ','(app2cC(X1, X5, X6, X7), permB(X7, X4))).
permB(.(X1, X2), .(X1, X3)) :- ','(app2cD(X2, X4), permB(X4, X3)).

Clauses:

app1cA(.(X1, X2), X3, X4, .(X1, X5)) :- app1cA(X2, X3, X4, X5).
app1cA([], X1, X2, .(X1, X2)).
permcB(.(X1, X2), .(X3, X4)) :- ','(app1cA(X5, X3, X6, X2), ','(app2cC(X1, X5, X6, X7), permcB(X7, X4))).
permcB(.(X1, X2), .(X1, X3)) :- ','(app2cD(X2, X4), permcB(X4, X3)).
permcB([], []).
permcB([], []).
app2cE(.(X1, X2), X3, .(X1, X4)) :- app2cE(X2, X3, X4).
app2cE([], X1, X1).
app2cC(X1, X2, X3, .(X1, X4)) :- app2cE(X2, X3, X4).
app2cD(X1, X1).

Afs:

permB(x1, x2)  =  permB(x1)

(3) TriplesToPiDPProof (SOUND transformation)

We use the technique of [DT09]. With regard to the inferred argument filtering the predicates were used in the following modes:
permB_in: (b,f)
app1A_in: (f,f,f,b)
app1cA_in: (f,f,f,b)
app2E_in: (b,b,f)
app2cC_in: (b,b,b,f)
app2cE_in: (b,b,f)
Transforming TRIPLES into the following Term Rewriting System:
Pi DP problem:
The TRS P consists of the following rules:

PERMB_IN_GA(.(X1, X2), .(X3, X4)) → U3_GA(X1, X2, X3, X4, app1A_in_aaag(X5, X3, X6, X2))
PERMB_IN_GA(.(X1, X2), .(X3, X4)) → APP1A_IN_AAAG(X5, X3, X6, X2)
APP1A_IN_AAAG(.(X1, X2), X3, X4, .(X1, X5)) → U1_AAAG(X1, X2, X3, X4, X5, app1A_in_aaag(X2, X3, X4, X5))
APP1A_IN_AAAG(.(X1, X2), X3, X4, .(X1, X5)) → APP1A_IN_AAAG(X2, X3, X4, X5)
PERMB_IN_GA(.(X1, X2), .(X3, X4)) → U4_GA(X1, X2, X3, X4, app1cA_in_aaag(X5, X3, X6, X2))
U4_GA(X1, X2, X3, X4, app1cA_out_aaag(X5, X3, X6, X2)) → U5_GA(X1, X2, X3, X4, app2E_in_gga(X5, X6, X7))
U4_GA(X1, X2, X3, X4, app1cA_out_aaag(X5, X3, X6, X2)) → APP2E_IN_GGA(X5, X6, X7)
APP2E_IN_GGA(.(X1, X2), X3, .(X1, X4)) → U2_GGA(X1, X2, X3, X4, app2E_in_gga(X2, X3, X4))
APP2E_IN_GGA(.(X1, X2), X3, .(X1, X4)) → APP2E_IN_GGA(X2, X3, X4)
U4_GA(X1, X2, X3, X4, app1cA_out_aaag(X5, X3, X6, X2)) → U6_GA(X1, X2, X3, X4, app2cC_in_ggga(X1, X5, X6, X7))
U6_GA(X1, X2, X3, X4, app2cC_out_ggga(X1, X5, X6, X7)) → U7_GA(X1, X2, X3, X4, permB_in_ga(X7, X4))
U6_GA(X1, X2, X3, X4, app2cC_out_ggga(X1, X5, X6, X7)) → PERMB_IN_GA(X7, X4)
PERMB_IN_GA(.(X1, X2), .(X1, X3)) → U8_GA(X1, X2, X3, app2cD_in_ga(X2, X4))
U8_GA(X1, X2, X3, app2cD_out_ga(X2, X4)) → U9_GA(X1, X2, X3, permB_in_ga(X4, X3))
U8_GA(X1, X2, X3, app2cD_out_ga(X2, X4)) → PERMB_IN_GA(X4, X3)

The TRS R consists of the following rules:

app1cA_in_aaag(.(X1, X2), X3, X4, .(X1, X5)) → U11_aaag(X1, X2, X3, X4, X5, app1cA_in_aaag(X2, X3, X4, X5))
app1cA_in_aaag([], X1, X2, .(X1, X2)) → app1cA_out_aaag([], X1, X2, .(X1, X2))
U11_aaag(X1, X2, X3, X4, X5, app1cA_out_aaag(X2, X3, X4, X5)) → app1cA_out_aaag(.(X1, X2), X3, X4, .(X1, X5))
app2cC_in_ggga(X1, X2, X3, .(X1, X4)) → U18_ggga(X1, X2, X3, X4, app2cE_in_gga(X2, X3, X4))
app2cE_in_gga(.(X1, X2), X3, .(X1, X4)) → U17_gga(X1, X2, X3, X4, app2cE_in_gga(X2, X3, X4))
app2cE_in_gga([], X1, X1) → app2cE_out_gga([], X1, X1)
U17_gga(X1, X2, X3, X4, app2cE_out_gga(X2, X3, X4)) → app2cE_out_gga(.(X1, X2), X3, .(X1, X4))
U18_ggga(X1, X2, X3, X4, app2cE_out_gga(X2, X3, X4)) → app2cC_out_ggga(X1, X2, X3, .(X1, X4))
app2cD_in_ga(X1, X1) → app2cD_out_ga(X1, X1)

The argument filtering Pi contains the following mapping:
permB_in_ga(x1, x2)  =  permB_in_ga(x1)
.(x1, x2)  =  .(x1, x2)
app1A_in_aaag(x1, x2, x3, x4)  =  app1A_in_aaag(x4)
app1cA_in_aaag(x1, x2, x3, x4)  =  app1cA_in_aaag(x4)
U11_aaag(x1, x2, x3, x4, x5, x6)  =  U11_aaag(x1, x5, x6)
app1cA_out_aaag(x1, x2, x3, x4)  =  app1cA_out_aaag(x1, x2, x3, x4)
app2E_in_gga(x1, x2, x3)  =  app2E_in_gga(x1, x2)
app2cC_in_ggga(x1, x2, x3, x4)  =  app2cC_in_ggga(x1, x2, x3)
U18_ggga(x1, x2, x3, x4, x5)  =  U18_ggga(x1, x2, x3, x5)
app2cE_in_gga(x1, x2, x3)  =  app2cE_in_gga(x1, x2)
U17_gga(x1, x2, x3, x4, x5)  =  U17_gga(x1, x2, x3, x5)
[]  =  []
app2cE_out_gga(x1, x2, x3)  =  app2cE_out_gga(x1, x2, x3)
app2cC_out_ggga(x1, x2, x3, x4)  =  app2cC_out_ggga(x1, x2, x3, x4)
app2cD_in_ga(x1, x2)  =  app2cD_in_ga(x1)
app2cD_out_ga(x1, x2)  =  app2cD_out_ga(x1, x2)
PERMB_IN_GA(x1, x2)  =  PERMB_IN_GA(x1)
U3_GA(x1, x2, x3, x4, x5)  =  U3_GA(x1, x2, x5)
APP1A_IN_AAAG(x1, x2, x3, x4)  =  APP1A_IN_AAAG(x4)
U1_AAAG(x1, x2, x3, x4, x5, x6)  =  U1_AAAG(x1, x5, x6)
U4_GA(x1, x2, x3, x4, x5)  =  U4_GA(x1, x2, x5)
U5_GA(x1, x2, x3, x4, x5)  =  U5_GA(x1, x2, x5)
APP2E_IN_GGA(x1, x2, x3)  =  APP2E_IN_GGA(x1, x2)
U2_GGA(x1, x2, x3, x4, x5)  =  U2_GGA(x1, x2, x3, x5)
U6_GA(x1, x2, x3, x4, x5)  =  U6_GA(x1, x2, x5)
U7_GA(x1, x2, x3, x4, x5)  =  U7_GA(x1, x2, x5)
U8_GA(x1, x2, x3, x4)  =  U8_GA(x1, x2, x4)
U9_GA(x1, x2, x3, x4)  =  U9_GA(x1, x2, x4)

We have to consider all (P,R,Pi)-chains

Infinitary Constructor Rewriting Termination of PiDP implies Termination of TRIPLES

(4) Obligation:

Pi DP problem:
The TRS P consists of the following rules:

PERMB_IN_GA(.(X1, X2), .(X3, X4)) → U3_GA(X1, X2, X3, X4, app1A_in_aaag(X5, X3, X6, X2))
PERMB_IN_GA(.(X1, X2), .(X3, X4)) → APP1A_IN_AAAG(X5, X3, X6, X2)
APP1A_IN_AAAG(.(X1, X2), X3, X4, .(X1, X5)) → U1_AAAG(X1, X2, X3, X4, X5, app1A_in_aaag(X2, X3, X4, X5))
APP1A_IN_AAAG(.(X1, X2), X3, X4, .(X1, X5)) → APP1A_IN_AAAG(X2, X3, X4, X5)
PERMB_IN_GA(.(X1, X2), .(X3, X4)) → U4_GA(X1, X2, X3, X4, app1cA_in_aaag(X5, X3, X6, X2))
U4_GA(X1, X2, X3, X4, app1cA_out_aaag(X5, X3, X6, X2)) → U5_GA(X1, X2, X3, X4, app2E_in_gga(X5, X6, X7))
U4_GA(X1, X2, X3, X4, app1cA_out_aaag(X5, X3, X6, X2)) → APP2E_IN_GGA(X5, X6, X7)
APP2E_IN_GGA(.(X1, X2), X3, .(X1, X4)) → U2_GGA(X1, X2, X3, X4, app2E_in_gga(X2, X3, X4))
APP2E_IN_GGA(.(X1, X2), X3, .(X1, X4)) → APP2E_IN_GGA(X2, X3, X4)
U4_GA(X1, X2, X3, X4, app1cA_out_aaag(X5, X3, X6, X2)) → U6_GA(X1, X2, X3, X4, app2cC_in_ggga(X1, X5, X6, X7))
U6_GA(X1, X2, X3, X4, app2cC_out_ggga(X1, X5, X6, X7)) → U7_GA(X1, X2, X3, X4, permB_in_ga(X7, X4))
U6_GA(X1, X2, X3, X4, app2cC_out_ggga(X1, X5, X6, X7)) → PERMB_IN_GA(X7, X4)
PERMB_IN_GA(.(X1, X2), .(X1, X3)) → U8_GA(X1, X2, X3, app2cD_in_ga(X2, X4))
U8_GA(X1, X2, X3, app2cD_out_ga(X2, X4)) → U9_GA(X1, X2, X3, permB_in_ga(X4, X3))
U8_GA(X1, X2, X3, app2cD_out_ga(X2, X4)) → PERMB_IN_GA(X4, X3)

The TRS R consists of the following rules:

app1cA_in_aaag(.(X1, X2), X3, X4, .(X1, X5)) → U11_aaag(X1, X2, X3, X4, X5, app1cA_in_aaag(X2, X3, X4, X5))
app1cA_in_aaag([], X1, X2, .(X1, X2)) → app1cA_out_aaag([], X1, X2, .(X1, X2))
U11_aaag(X1, X2, X3, X4, X5, app1cA_out_aaag(X2, X3, X4, X5)) → app1cA_out_aaag(.(X1, X2), X3, X4, .(X1, X5))
app2cC_in_ggga(X1, X2, X3, .(X1, X4)) → U18_ggga(X1, X2, X3, X4, app2cE_in_gga(X2, X3, X4))
app2cE_in_gga(.(X1, X2), X3, .(X1, X4)) → U17_gga(X1, X2, X3, X4, app2cE_in_gga(X2, X3, X4))
app2cE_in_gga([], X1, X1) → app2cE_out_gga([], X1, X1)
U17_gga(X1, X2, X3, X4, app2cE_out_gga(X2, X3, X4)) → app2cE_out_gga(.(X1, X2), X3, .(X1, X4))
U18_ggga(X1, X2, X3, X4, app2cE_out_gga(X2, X3, X4)) → app2cC_out_ggga(X1, X2, X3, .(X1, X4))
app2cD_in_ga(X1, X1) → app2cD_out_ga(X1, X1)

The argument filtering Pi contains the following mapping:
permB_in_ga(x1, x2)  =  permB_in_ga(x1)
.(x1, x2)  =  .(x1, x2)
app1A_in_aaag(x1, x2, x3, x4)  =  app1A_in_aaag(x4)
app1cA_in_aaag(x1, x2, x3, x4)  =  app1cA_in_aaag(x4)
U11_aaag(x1, x2, x3, x4, x5, x6)  =  U11_aaag(x1, x5, x6)
app1cA_out_aaag(x1, x2, x3, x4)  =  app1cA_out_aaag(x1, x2, x3, x4)
app2E_in_gga(x1, x2, x3)  =  app2E_in_gga(x1, x2)
app2cC_in_ggga(x1, x2, x3, x4)  =  app2cC_in_ggga(x1, x2, x3)
U18_ggga(x1, x2, x3, x4, x5)  =  U18_ggga(x1, x2, x3, x5)
app2cE_in_gga(x1, x2, x3)  =  app2cE_in_gga(x1, x2)
U17_gga(x1, x2, x3, x4, x5)  =  U17_gga(x1, x2, x3, x5)
[]  =  []
app2cE_out_gga(x1, x2, x3)  =  app2cE_out_gga(x1, x2, x3)
app2cC_out_ggga(x1, x2, x3, x4)  =  app2cC_out_ggga(x1, x2, x3, x4)
app2cD_in_ga(x1, x2)  =  app2cD_in_ga(x1)
app2cD_out_ga(x1, x2)  =  app2cD_out_ga(x1, x2)
PERMB_IN_GA(x1, x2)  =  PERMB_IN_GA(x1)
U3_GA(x1, x2, x3, x4, x5)  =  U3_GA(x1, x2, x5)
APP1A_IN_AAAG(x1, x2, x3, x4)  =  APP1A_IN_AAAG(x4)
U1_AAAG(x1, x2, x3, x4, x5, x6)  =  U1_AAAG(x1, x5, x6)
U4_GA(x1, x2, x3, x4, x5)  =  U4_GA(x1, x2, x5)
U5_GA(x1, x2, x3, x4, x5)  =  U5_GA(x1, x2, x5)
APP2E_IN_GGA(x1, x2, x3)  =  APP2E_IN_GGA(x1, x2)
U2_GGA(x1, x2, x3, x4, x5)  =  U2_GGA(x1, x2, x3, x5)
U6_GA(x1, x2, x3, x4, x5)  =  U6_GA(x1, x2, x5)
U7_GA(x1, x2, x3, x4, x5)  =  U7_GA(x1, x2, x5)
U8_GA(x1, x2, x3, x4)  =  U8_GA(x1, x2, x4)
U9_GA(x1, x2, x3, x4)  =  U9_GA(x1, x2, x4)

We have to consider all (P,R,Pi)-chains

(5) DependencyGraphProof (EQUIVALENT transformation)

The approximation of the Dependency Graph [LOPSTR] contains 3 SCCs with 8 less nodes.

(6) Complex Obligation (AND)

(7) Obligation:

Pi DP problem:
The TRS P consists of the following rules:

APP2E_IN_GGA(.(X1, X2), X3, .(X1, X4)) → APP2E_IN_GGA(X2, X3, X4)

The TRS R consists of the following rules:

app1cA_in_aaag(.(X1, X2), X3, X4, .(X1, X5)) → U11_aaag(X1, X2, X3, X4, X5, app1cA_in_aaag(X2, X3, X4, X5))
app1cA_in_aaag([], X1, X2, .(X1, X2)) → app1cA_out_aaag([], X1, X2, .(X1, X2))
U11_aaag(X1, X2, X3, X4, X5, app1cA_out_aaag(X2, X3, X4, X5)) → app1cA_out_aaag(.(X1, X2), X3, X4, .(X1, X5))
app2cC_in_ggga(X1, X2, X3, .(X1, X4)) → U18_ggga(X1, X2, X3, X4, app2cE_in_gga(X2, X3, X4))
app2cE_in_gga(.(X1, X2), X3, .(X1, X4)) → U17_gga(X1, X2, X3, X4, app2cE_in_gga(X2, X3, X4))
app2cE_in_gga([], X1, X1) → app2cE_out_gga([], X1, X1)
U17_gga(X1, X2, X3, X4, app2cE_out_gga(X2, X3, X4)) → app2cE_out_gga(.(X1, X2), X3, .(X1, X4))
U18_ggga(X1, X2, X3, X4, app2cE_out_gga(X2, X3, X4)) → app2cC_out_ggga(X1, X2, X3, .(X1, X4))
app2cD_in_ga(X1, X1) → app2cD_out_ga(X1, X1)

The argument filtering Pi contains the following mapping:
.(x1, x2)  =  .(x1, x2)
app1cA_in_aaag(x1, x2, x3, x4)  =  app1cA_in_aaag(x4)
U11_aaag(x1, x2, x3, x4, x5, x6)  =  U11_aaag(x1, x5, x6)
app1cA_out_aaag(x1, x2, x3, x4)  =  app1cA_out_aaag(x1, x2, x3, x4)
app2cC_in_ggga(x1, x2, x3, x4)  =  app2cC_in_ggga(x1, x2, x3)
U18_ggga(x1, x2, x3, x4, x5)  =  U18_ggga(x1, x2, x3, x5)
app2cE_in_gga(x1, x2, x3)  =  app2cE_in_gga(x1, x2)
U17_gga(x1, x2, x3, x4, x5)  =  U17_gga(x1, x2, x3, x5)
[]  =  []
app2cE_out_gga(x1, x2, x3)  =  app2cE_out_gga(x1, x2, x3)
app2cC_out_ggga(x1, x2, x3, x4)  =  app2cC_out_ggga(x1, x2, x3, x4)
app2cD_in_ga(x1, x2)  =  app2cD_in_ga(x1)
app2cD_out_ga(x1, x2)  =  app2cD_out_ga(x1, x2)
APP2E_IN_GGA(x1, x2, x3)  =  APP2E_IN_GGA(x1, x2)

We have to consider all (P,R,Pi)-chains

(8) UsableRulesProof (EQUIVALENT transformation)

For (infinitary) constructor rewriting [LOPSTR] we can delete all non-usable rules from R.

(9) Obligation:

Pi DP problem:
The TRS P consists of the following rules:

APP2E_IN_GGA(.(X1, X2), X3, .(X1, X4)) → APP2E_IN_GGA(X2, X3, X4)

R is empty.
The argument filtering Pi contains the following mapping:
.(x1, x2)  =  .(x1, x2)
APP2E_IN_GGA(x1, x2, x3)  =  APP2E_IN_GGA(x1, x2)

We have to consider all (P,R,Pi)-chains

(10) PiDPToQDPProof (SOUND transformation)

Transforming (infinitary) constructor rewriting Pi-DP problem [LOPSTR] into ordinary QDP problem [LPAR04] by application of Pi.

(11) Obligation:

Q DP problem:
The TRS P consists of the following rules:

APP2E_IN_GGA(.(X1, X2), X3) → APP2E_IN_GGA(X2, X3)

R is empty.
Q is empty.
We have to consider all (P,Q,R)-chains.

(12) QDPSizeChangeProof (EQUIVALENT transformation)

By using the subterm criterion [SUBTERM_CRITERION] together with the size-change analysis [AAECC05] we have proven that there are no infinite chains for this DP problem.

From the DPs we obtained the following set of size-change graphs:

  • APP2E_IN_GGA(.(X1, X2), X3) → APP2E_IN_GGA(X2, X3)
    The graph contains the following edges 1 > 1, 2 >= 2

(13) YES

(14) Obligation:

Pi DP problem:
The TRS P consists of the following rules:

APP1A_IN_AAAG(.(X1, X2), X3, X4, .(X1, X5)) → APP1A_IN_AAAG(X2, X3, X4, X5)

The TRS R consists of the following rules:

app1cA_in_aaag(.(X1, X2), X3, X4, .(X1, X5)) → U11_aaag(X1, X2, X3, X4, X5, app1cA_in_aaag(X2, X3, X4, X5))
app1cA_in_aaag([], X1, X2, .(X1, X2)) → app1cA_out_aaag([], X1, X2, .(X1, X2))
U11_aaag(X1, X2, X3, X4, X5, app1cA_out_aaag(X2, X3, X4, X5)) → app1cA_out_aaag(.(X1, X2), X3, X4, .(X1, X5))
app2cC_in_ggga(X1, X2, X3, .(X1, X4)) → U18_ggga(X1, X2, X3, X4, app2cE_in_gga(X2, X3, X4))
app2cE_in_gga(.(X1, X2), X3, .(X1, X4)) → U17_gga(X1, X2, X3, X4, app2cE_in_gga(X2, X3, X4))
app2cE_in_gga([], X1, X1) → app2cE_out_gga([], X1, X1)
U17_gga(X1, X2, X3, X4, app2cE_out_gga(X2, X3, X4)) → app2cE_out_gga(.(X1, X2), X3, .(X1, X4))
U18_ggga(X1, X2, X3, X4, app2cE_out_gga(X2, X3, X4)) → app2cC_out_ggga(X1, X2, X3, .(X1, X4))
app2cD_in_ga(X1, X1) → app2cD_out_ga(X1, X1)

The argument filtering Pi contains the following mapping:
.(x1, x2)  =  .(x1, x2)
app1cA_in_aaag(x1, x2, x3, x4)  =  app1cA_in_aaag(x4)
U11_aaag(x1, x2, x3, x4, x5, x6)  =  U11_aaag(x1, x5, x6)
app1cA_out_aaag(x1, x2, x3, x4)  =  app1cA_out_aaag(x1, x2, x3, x4)
app2cC_in_ggga(x1, x2, x3, x4)  =  app2cC_in_ggga(x1, x2, x3)
U18_ggga(x1, x2, x3, x4, x5)  =  U18_ggga(x1, x2, x3, x5)
app2cE_in_gga(x1, x2, x3)  =  app2cE_in_gga(x1, x2)
U17_gga(x1, x2, x3, x4, x5)  =  U17_gga(x1, x2, x3, x5)
[]  =  []
app2cE_out_gga(x1, x2, x3)  =  app2cE_out_gga(x1, x2, x3)
app2cC_out_ggga(x1, x2, x3, x4)  =  app2cC_out_ggga(x1, x2, x3, x4)
app2cD_in_ga(x1, x2)  =  app2cD_in_ga(x1)
app2cD_out_ga(x1, x2)  =  app2cD_out_ga(x1, x2)
APP1A_IN_AAAG(x1, x2, x3, x4)  =  APP1A_IN_AAAG(x4)

We have to consider all (P,R,Pi)-chains

(15) UsableRulesProof (EQUIVALENT transformation)

For (infinitary) constructor rewriting [LOPSTR] we can delete all non-usable rules from R.

(16) Obligation:

Pi DP problem:
The TRS P consists of the following rules:

APP1A_IN_AAAG(.(X1, X2), X3, X4, .(X1, X5)) → APP1A_IN_AAAG(X2, X3, X4, X5)

R is empty.
The argument filtering Pi contains the following mapping:
.(x1, x2)  =  .(x1, x2)
APP1A_IN_AAAG(x1, x2, x3, x4)  =  APP1A_IN_AAAG(x4)

We have to consider all (P,R,Pi)-chains

(17) PiDPToQDPProof (SOUND transformation)

Transforming (infinitary) constructor rewriting Pi-DP problem [LOPSTR] into ordinary QDP problem [LPAR04] by application of Pi.

(18) Obligation:

Q DP problem:
The TRS P consists of the following rules:

APP1A_IN_AAAG(.(X1, X5)) → APP1A_IN_AAAG(X5)

R is empty.
Q is empty.
We have to consider all (P,Q,R)-chains.

(19) QDPSizeChangeProof (EQUIVALENT transformation)

By using the subterm criterion [SUBTERM_CRITERION] together with the size-change analysis [AAECC05] we have proven that there are no infinite chains for this DP problem.

From the DPs we obtained the following set of size-change graphs:

  • APP1A_IN_AAAG(.(X1, X5)) → APP1A_IN_AAAG(X5)
    The graph contains the following edges 1 > 1

(20) YES

(21) Obligation:

Pi DP problem:
The TRS P consists of the following rules:

PERMB_IN_GA(.(X1, X2), .(X3, X4)) → U4_GA(X1, X2, X3, X4, app1cA_in_aaag(X5, X3, X6, X2))
U4_GA(X1, X2, X3, X4, app1cA_out_aaag(X5, X3, X6, X2)) → U6_GA(X1, X2, X3, X4, app2cC_in_ggga(X1, X5, X6, X7))
U6_GA(X1, X2, X3, X4, app2cC_out_ggga(X1, X5, X6, X7)) → PERMB_IN_GA(X7, X4)
PERMB_IN_GA(.(X1, X2), .(X1, X3)) → U8_GA(X1, X2, X3, app2cD_in_ga(X2, X4))
U8_GA(X1, X2, X3, app2cD_out_ga(X2, X4)) → PERMB_IN_GA(X4, X3)

The TRS R consists of the following rules:

app1cA_in_aaag(.(X1, X2), X3, X4, .(X1, X5)) → U11_aaag(X1, X2, X3, X4, X5, app1cA_in_aaag(X2, X3, X4, X5))
app1cA_in_aaag([], X1, X2, .(X1, X2)) → app1cA_out_aaag([], X1, X2, .(X1, X2))
U11_aaag(X1, X2, X3, X4, X5, app1cA_out_aaag(X2, X3, X4, X5)) → app1cA_out_aaag(.(X1, X2), X3, X4, .(X1, X5))
app2cC_in_ggga(X1, X2, X3, .(X1, X4)) → U18_ggga(X1, X2, X3, X4, app2cE_in_gga(X2, X3, X4))
app2cE_in_gga(.(X1, X2), X3, .(X1, X4)) → U17_gga(X1, X2, X3, X4, app2cE_in_gga(X2, X3, X4))
app2cE_in_gga([], X1, X1) → app2cE_out_gga([], X1, X1)
U17_gga(X1, X2, X3, X4, app2cE_out_gga(X2, X3, X4)) → app2cE_out_gga(.(X1, X2), X3, .(X1, X4))
U18_ggga(X1, X2, X3, X4, app2cE_out_gga(X2, X3, X4)) → app2cC_out_ggga(X1, X2, X3, .(X1, X4))
app2cD_in_ga(X1, X1) → app2cD_out_ga(X1, X1)

The argument filtering Pi contains the following mapping:
.(x1, x2)  =  .(x1, x2)
app1cA_in_aaag(x1, x2, x3, x4)  =  app1cA_in_aaag(x4)
U11_aaag(x1, x2, x3, x4, x5, x6)  =  U11_aaag(x1, x5, x6)
app1cA_out_aaag(x1, x2, x3, x4)  =  app1cA_out_aaag(x1, x2, x3, x4)
app2cC_in_ggga(x1, x2, x3, x4)  =  app2cC_in_ggga(x1, x2, x3)
U18_ggga(x1, x2, x3, x4, x5)  =  U18_ggga(x1, x2, x3, x5)
app2cE_in_gga(x1, x2, x3)  =  app2cE_in_gga(x1, x2)
U17_gga(x1, x2, x3, x4, x5)  =  U17_gga(x1, x2, x3, x5)
[]  =  []
app2cE_out_gga(x1, x2, x3)  =  app2cE_out_gga(x1, x2, x3)
app2cC_out_ggga(x1, x2, x3, x4)  =  app2cC_out_ggga(x1, x2, x3, x4)
app2cD_in_ga(x1, x2)  =  app2cD_in_ga(x1)
app2cD_out_ga(x1, x2)  =  app2cD_out_ga(x1, x2)
PERMB_IN_GA(x1, x2)  =  PERMB_IN_GA(x1)
U4_GA(x1, x2, x3, x4, x5)  =  U4_GA(x1, x2, x5)
U6_GA(x1, x2, x3, x4, x5)  =  U6_GA(x1, x2, x5)
U8_GA(x1, x2, x3, x4)  =  U8_GA(x1, x2, x4)

We have to consider all (P,R,Pi)-chains

(22) PiDPToQDPProof (SOUND transformation)

Transforming (infinitary) constructor rewriting Pi-DP problem [LOPSTR] into ordinary QDP problem [LPAR04] by application of Pi.

(23) Obligation:

Q DP problem:
The TRS P consists of the following rules:

PERMB_IN_GA(.(X1, X2)) → U4_GA(X1, X2, app1cA_in_aaag(X2))
U4_GA(X1, X2, app1cA_out_aaag(X5, X3, X6, X2)) → U6_GA(X1, X2, app2cC_in_ggga(X1, X5, X6))
U6_GA(X1, X2, app2cC_out_ggga(X1, X5, X6, X7)) → PERMB_IN_GA(X7)
PERMB_IN_GA(.(X1, X2)) → U8_GA(X1, X2, app2cD_in_ga(X2))
U8_GA(X1, X2, app2cD_out_ga(X2, X4)) → PERMB_IN_GA(X4)

The TRS R consists of the following rules:

app1cA_in_aaag(.(X1, X5)) → U11_aaag(X1, X5, app1cA_in_aaag(X5))
app1cA_in_aaag(.(X1, X2)) → app1cA_out_aaag([], X1, X2, .(X1, X2))
U11_aaag(X1, X5, app1cA_out_aaag(X2, X3, X4, X5)) → app1cA_out_aaag(.(X1, X2), X3, X4, .(X1, X5))
app2cC_in_ggga(X1, X2, X3) → U18_ggga(X1, X2, X3, app2cE_in_gga(X2, X3))
app2cE_in_gga(.(X1, X2), X3) → U17_gga(X1, X2, X3, app2cE_in_gga(X2, X3))
app2cE_in_gga([], X1) → app2cE_out_gga([], X1, X1)
U17_gga(X1, X2, X3, app2cE_out_gga(X2, X3, X4)) → app2cE_out_gga(.(X1, X2), X3, .(X1, X4))
U18_ggga(X1, X2, X3, app2cE_out_gga(X2, X3, X4)) → app2cC_out_ggga(X1, X2, X3, .(X1, X4))
app2cD_in_ga(X1) → app2cD_out_ga(X1, X1)

The set Q consists of the following terms:

app1cA_in_aaag(x0)
U11_aaag(x0, x1, x2)
app2cC_in_ggga(x0, x1, x2)
app2cE_in_gga(x0, x1)
U17_gga(x0, x1, x2, x3)
U18_ggga(x0, x1, x2, x3)
app2cD_in_ga(x0)

We have to consider all (P,Q,R)-chains.

(24) Rewriting (EQUIVALENT transformation)

By rewriting [LPAR04] the rule U4_GA(X1, X2, app1cA_out_aaag(X5, X3, X6, X2)) → U6_GA(X1, X2, app2cC_in_ggga(X1, X5, X6)) at position [2] we obtained the following new rules [LPAR04]:

U4_GA(X1, X2, app1cA_out_aaag(X5, X3, X6, X2)) → U6_GA(X1, X2, U18_ggga(X1, X5, X6, app2cE_in_gga(X5, X6)))

(25) Obligation:

Q DP problem:
The TRS P consists of the following rules:

PERMB_IN_GA(.(X1, X2)) → U4_GA(X1, X2, app1cA_in_aaag(X2))
U6_GA(X1, X2, app2cC_out_ggga(X1, X5, X6, X7)) → PERMB_IN_GA(X7)
PERMB_IN_GA(.(X1, X2)) → U8_GA(X1, X2, app2cD_in_ga(X2))
U8_GA(X1, X2, app2cD_out_ga(X2, X4)) → PERMB_IN_GA(X4)
U4_GA(X1, X2, app1cA_out_aaag(X5, X3, X6, X2)) → U6_GA(X1, X2, U18_ggga(X1, X5, X6, app2cE_in_gga(X5, X6)))

The TRS R consists of the following rules:

app1cA_in_aaag(.(X1, X5)) → U11_aaag(X1, X5, app1cA_in_aaag(X5))
app1cA_in_aaag(.(X1, X2)) → app1cA_out_aaag([], X1, X2, .(X1, X2))
U11_aaag(X1, X5, app1cA_out_aaag(X2, X3, X4, X5)) → app1cA_out_aaag(.(X1, X2), X3, X4, .(X1, X5))
app2cC_in_ggga(X1, X2, X3) → U18_ggga(X1, X2, X3, app2cE_in_gga(X2, X3))
app2cE_in_gga(.(X1, X2), X3) → U17_gga(X1, X2, X3, app2cE_in_gga(X2, X3))
app2cE_in_gga([], X1) → app2cE_out_gga([], X1, X1)
U17_gga(X1, X2, X3, app2cE_out_gga(X2, X3, X4)) → app2cE_out_gga(.(X1, X2), X3, .(X1, X4))
U18_ggga(X1, X2, X3, app2cE_out_gga(X2, X3, X4)) → app2cC_out_ggga(X1, X2, X3, .(X1, X4))
app2cD_in_ga(X1) → app2cD_out_ga(X1, X1)

The set Q consists of the following terms:

app1cA_in_aaag(x0)
U11_aaag(x0, x1, x2)
app2cC_in_ggga(x0, x1, x2)
app2cE_in_gga(x0, x1)
U17_gga(x0, x1, x2, x3)
U18_ggga(x0, x1, x2, x3)
app2cD_in_ga(x0)

We have to consider all (P,Q,R)-chains.

(26) UsableRulesProof (EQUIVALENT transformation)

As all Q-normal forms are R-normal forms we are in the innermost case. Hence, by the usable rules processor [LPAR04] we can delete all non-usable rules [FROCOS05] from R.

(27) Obligation:

Q DP problem:
The TRS P consists of the following rules:

PERMB_IN_GA(.(X1, X2)) → U4_GA(X1, X2, app1cA_in_aaag(X2))
U6_GA(X1, X2, app2cC_out_ggga(X1, X5, X6, X7)) → PERMB_IN_GA(X7)
PERMB_IN_GA(.(X1, X2)) → U8_GA(X1, X2, app2cD_in_ga(X2))
U8_GA(X1, X2, app2cD_out_ga(X2, X4)) → PERMB_IN_GA(X4)
U4_GA(X1, X2, app1cA_out_aaag(X5, X3, X6, X2)) → U6_GA(X1, X2, U18_ggga(X1, X5, X6, app2cE_in_gga(X5, X6)))

The TRS R consists of the following rules:

app2cE_in_gga(.(X1, X2), X3) → U17_gga(X1, X2, X3, app2cE_in_gga(X2, X3))
app2cE_in_gga([], X1) → app2cE_out_gga([], X1, X1)
U18_ggga(X1, X2, X3, app2cE_out_gga(X2, X3, X4)) → app2cC_out_ggga(X1, X2, X3, .(X1, X4))
U17_gga(X1, X2, X3, app2cE_out_gga(X2, X3, X4)) → app2cE_out_gga(.(X1, X2), X3, .(X1, X4))
app2cD_in_ga(X1) → app2cD_out_ga(X1, X1)
app1cA_in_aaag(.(X1, X5)) → U11_aaag(X1, X5, app1cA_in_aaag(X5))
app1cA_in_aaag(.(X1, X2)) → app1cA_out_aaag([], X1, X2, .(X1, X2))
U11_aaag(X1, X5, app1cA_out_aaag(X2, X3, X4, X5)) → app1cA_out_aaag(.(X1, X2), X3, X4, .(X1, X5))

The set Q consists of the following terms:

app1cA_in_aaag(x0)
U11_aaag(x0, x1, x2)
app2cC_in_ggga(x0, x1, x2)
app2cE_in_gga(x0, x1)
U17_gga(x0, x1, x2, x3)
U18_ggga(x0, x1, x2, x3)
app2cD_in_ga(x0)

We have to consider all (P,Q,R)-chains.

(28) QReductionProof (EQUIVALENT transformation)

We deleted the following terms from Q as each root-symbol of these terms does neither occur in P nor in R.[THIEMANN].

app2cC_in_ggga(x0, x1, x2)

(29) Obligation:

Q DP problem:
The TRS P consists of the following rules:

PERMB_IN_GA(.(X1, X2)) → U4_GA(X1, X2, app1cA_in_aaag(X2))
U6_GA(X1, X2, app2cC_out_ggga(X1, X5, X6, X7)) → PERMB_IN_GA(X7)
PERMB_IN_GA(.(X1, X2)) → U8_GA(X1, X2, app2cD_in_ga(X2))
U8_GA(X1, X2, app2cD_out_ga(X2, X4)) → PERMB_IN_GA(X4)
U4_GA(X1, X2, app1cA_out_aaag(X5, X3, X6, X2)) → U6_GA(X1, X2, U18_ggga(X1, X5, X6, app2cE_in_gga(X5, X6)))

The TRS R consists of the following rules:

app2cE_in_gga(.(X1, X2), X3) → U17_gga(X1, X2, X3, app2cE_in_gga(X2, X3))
app2cE_in_gga([], X1) → app2cE_out_gga([], X1, X1)
U18_ggga(X1, X2, X3, app2cE_out_gga(X2, X3, X4)) → app2cC_out_ggga(X1, X2, X3, .(X1, X4))
U17_gga(X1, X2, X3, app2cE_out_gga(X2, X3, X4)) → app2cE_out_gga(.(X1, X2), X3, .(X1, X4))
app2cD_in_ga(X1) → app2cD_out_ga(X1, X1)
app1cA_in_aaag(.(X1, X5)) → U11_aaag(X1, X5, app1cA_in_aaag(X5))
app1cA_in_aaag(.(X1, X2)) → app1cA_out_aaag([], X1, X2, .(X1, X2))
U11_aaag(X1, X5, app1cA_out_aaag(X2, X3, X4, X5)) → app1cA_out_aaag(.(X1, X2), X3, X4, .(X1, X5))

The set Q consists of the following terms:

app1cA_in_aaag(x0)
U11_aaag(x0, x1, x2)
app2cE_in_gga(x0, x1)
U17_gga(x0, x1, x2, x3)
U18_ggga(x0, x1, x2, x3)
app2cD_in_ga(x0)

We have to consider all (P,Q,R)-chains.

(30) Rewriting (EQUIVALENT transformation)

By rewriting [LPAR04] the rule PERMB_IN_GA(.(X1, X2)) → U8_GA(X1, X2, app2cD_in_ga(X2)) at position [2] we obtained the following new rules [LPAR04]:

PERMB_IN_GA(.(X1, X2)) → U8_GA(X1, X2, app2cD_out_ga(X2, X2))

(31) Obligation:

Q DP problem:
The TRS P consists of the following rules:

PERMB_IN_GA(.(X1, X2)) → U4_GA(X1, X2, app1cA_in_aaag(X2))
U6_GA(X1, X2, app2cC_out_ggga(X1, X5, X6, X7)) → PERMB_IN_GA(X7)
U8_GA(X1, X2, app2cD_out_ga(X2, X4)) → PERMB_IN_GA(X4)
U4_GA(X1, X2, app1cA_out_aaag(X5, X3, X6, X2)) → U6_GA(X1, X2, U18_ggga(X1, X5, X6, app2cE_in_gga(X5, X6)))
PERMB_IN_GA(.(X1, X2)) → U8_GA(X1, X2, app2cD_out_ga(X2, X2))

The TRS R consists of the following rules:

app2cE_in_gga(.(X1, X2), X3) → U17_gga(X1, X2, X3, app2cE_in_gga(X2, X3))
app2cE_in_gga([], X1) → app2cE_out_gga([], X1, X1)
U18_ggga(X1, X2, X3, app2cE_out_gga(X2, X3, X4)) → app2cC_out_ggga(X1, X2, X3, .(X1, X4))
U17_gga(X1, X2, X3, app2cE_out_gga(X2, X3, X4)) → app2cE_out_gga(.(X1, X2), X3, .(X1, X4))
app2cD_in_ga(X1) → app2cD_out_ga(X1, X1)
app1cA_in_aaag(.(X1, X5)) → U11_aaag(X1, X5, app1cA_in_aaag(X5))
app1cA_in_aaag(.(X1, X2)) → app1cA_out_aaag([], X1, X2, .(X1, X2))
U11_aaag(X1, X5, app1cA_out_aaag(X2, X3, X4, X5)) → app1cA_out_aaag(.(X1, X2), X3, X4, .(X1, X5))

The set Q consists of the following terms:

app1cA_in_aaag(x0)
U11_aaag(x0, x1, x2)
app2cE_in_gga(x0, x1)
U17_gga(x0, x1, x2, x3)
U18_ggga(x0, x1, x2, x3)
app2cD_in_ga(x0)

We have to consider all (P,Q,R)-chains.

(32) UsableRulesProof (EQUIVALENT transformation)

As all Q-normal forms are R-normal forms we are in the innermost case. Hence, by the usable rules processor [LPAR04] we can delete all non-usable rules [FROCOS05] from R.

(33) Obligation:

Q DP problem:
The TRS P consists of the following rules:

PERMB_IN_GA(.(X1, X2)) → U4_GA(X1, X2, app1cA_in_aaag(X2))
U6_GA(X1, X2, app2cC_out_ggga(X1, X5, X6, X7)) → PERMB_IN_GA(X7)
U8_GA(X1, X2, app2cD_out_ga(X2, X4)) → PERMB_IN_GA(X4)
U4_GA(X1, X2, app1cA_out_aaag(X5, X3, X6, X2)) → U6_GA(X1, X2, U18_ggga(X1, X5, X6, app2cE_in_gga(X5, X6)))
PERMB_IN_GA(.(X1, X2)) → U8_GA(X1, X2, app2cD_out_ga(X2, X2))

The TRS R consists of the following rules:

app2cE_in_gga(.(X1, X2), X3) → U17_gga(X1, X2, X3, app2cE_in_gga(X2, X3))
app2cE_in_gga([], X1) → app2cE_out_gga([], X1, X1)
U18_ggga(X1, X2, X3, app2cE_out_gga(X2, X3, X4)) → app2cC_out_ggga(X1, X2, X3, .(X1, X4))
U17_gga(X1, X2, X3, app2cE_out_gga(X2, X3, X4)) → app2cE_out_gga(.(X1, X2), X3, .(X1, X4))
app1cA_in_aaag(.(X1, X5)) → U11_aaag(X1, X5, app1cA_in_aaag(X5))
app1cA_in_aaag(.(X1, X2)) → app1cA_out_aaag([], X1, X2, .(X1, X2))
U11_aaag(X1, X5, app1cA_out_aaag(X2, X3, X4, X5)) → app1cA_out_aaag(.(X1, X2), X3, X4, .(X1, X5))

The set Q consists of the following terms:

app1cA_in_aaag(x0)
U11_aaag(x0, x1, x2)
app2cE_in_gga(x0, x1)
U17_gga(x0, x1, x2, x3)
U18_ggga(x0, x1, x2, x3)
app2cD_in_ga(x0)

We have to consider all (P,Q,R)-chains.

(34) QReductionProof (EQUIVALENT transformation)

We deleted the following terms from Q as each root-symbol of these terms does neither occur in P nor in R.[THIEMANN].

app2cD_in_ga(x0)

(35) Obligation:

Q DP problem:
The TRS P consists of the following rules:

PERMB_IN_GA(.(X1, X2)) → U4_GA(X1, X2, app1cA_in_aaag(X2))
U6_GA(X1, X2, app2cC_out_ggga(X1, X5, X6, X7)) → PERMB_IN_GA(X7)
U8_GA(X1, X2, app2cD_out_ga(X2, X4)) → PERMB_IN_GA(X4)
U4_GA(X1, X2, app1cA_out_aaag(X5, X3, X6, X2)) → U6_GA(X1, X2, U18_ggga(X1, X5, X6, app2cE_in_gga(X5, X6)))
PERMB_IN_GA(.(X1, X2)) → U8_GA(X1, X2, app2cD_out_ga(X2, X2))

The TRS R consists of the following rules:

app2cE_in_gga(.(X1, X2), X3) → U17_gga(X1, X2, X3, app2cE_in_gga(X2, X3))
app2cE_in_gga([], X1) → app2cE_out_gga([], X1, X1)
U18_ggga(X1, X2, X3, app2cE_out_gga(X2, X3, X4)) → app2cC_out_ggga(X1, X2, X3, .(X1, X4))
U17_gga(X1, X2, X3, app2cE_out_gga(X2, X3, X4)) → app2cE_out_gga(.(X1, X2), X3, .(X1, X4))
app1cA_in_aaag(.(X1, X5)) → U11_aaag(X1, X5, app1cA_in_aaag(X5))
app1cA_in_aaag(.(X1, X2)) → app1cA_out_aaag([], X1, X2, .(X1, X2))
U11_aaag(X1, X5, app1cA_out_aaag(X2, X3, X4, X5)) → app1cA_out_aaag(.(X1, X2), X3, X4, .(X1, X5))

The set Q consists of the following terms:

app1cA_in_aaag(x0)
U11_aaag(x0, x1, x2)
app2cE_in_gga(x0, x1)
U17_gga(x0, x1, x2, x3)
U18_ggga(x0, x1, x2, x3)

We have to consider all (P,Q,R)-chains.

(36) Instantiation (EQUIVALENT transformation)

By instantiating [LPAR04] the rule U8_GA(X1, X2, app2cD_out_ga(X2, X4)) → PERMB_IN_GA(X4) we obtained the following new rules [LPAR04]:

U8_GA(z0, z1, app2cD_out_ga(z1, z1)) → PERMB_IN_GA(z1)

(37) Obligation:

Q DP problem:
The TRS P consists of the following rules:

PERMB_IN_GA(.(X1, X2)) → U4_GA(X1, X2, app1cA_in_aaag(X2))
U6_GA(X1, X2, app2cC_out_ggga(X1, X5, X6, X7)) → PERMB_IN_GA(X7)
U4_GA(X1, X2, app1cA_out_aaag(X5, X3, X6, X2)) → U6_GA(X1, X2, U18_ggga(X1, X5, X6, app2cE_in_gga(X5, X6)))
PERMB_IN_GA(.(X1, X2)) → U8_GA(X1, X2, app2cD_out_ga(X2, X2))
U8_GA(z0, z1, app2cD_out_ga(z1, z1)) → PERMB_IN_GA(z1)

The TRS R consists of the following rules:

app2cE_in_gga(.(X1, X2), X3) → U17_gga(X1, X2, X3, app2cE_in_gga(X2, X3))
app2cE_in_gga([], X1) → app2cE_out_gga([], X1, X1)
U18_ggga(X1, X2, X3, app2cE_out_gga(X2, X3, X4)) → app2cC_out_ggga(X1, X2, X3, .(X1, X4))
U17_gga(X1, X2, X3, app2cE_out_gga(X2, X3, X4)) → app2cE_out_gga(.(X1, X2), X3, .(X1, X4))
app1cA_in_aaag(.(X1, X5)) → U11_aaag(X1, X5, app1cA_in_aaag(X5))
app1cA_in_aaag(.(X1, X2)) → app1cA_out_aaag([], X1, X2, .(X1, X2))
U11_aaag(X1, X5, app1cA_out_aaag(X2, X3, X4, X5)) → app1cA_out_aaag(.(X1, X2), X3, X4, .(X1, X5))

The set Q consists of the following terms:

app1cA_in_aaag(x0)
U11_aaag(x0, x1, x2)
app2cE_in_gga(x0, x1)
U17_gga(x0, x1, x2, x3)
U18_ggga(x0, x1, x2, x3)

We have to consider all (P,Q,R)-chains.

(38) QDPOrderProof (EQUIVALENT transformation)

We use the reduction pair processor [LPAR04,JAR06].


The following pairs can be oriented strictly and are deleted.


U4_GA(X1, X2, app1cA_out_aaag(X5, X3, X6, X2)) → U6_GA(X1, X2, U18_ggga(X1, X5, X6, app2cE_in_gga(X5, X6)))
U8_GA(z0, z1, app2cD_out_ga(z1, z1)) → PERMB_IN_GA(z1)
The remaining pairs can at least be oriented weakly.
Used ordering: Polynomial interpretation [POLO]:

POL(.(x1, x2)) = 1 + x2   
POL(PERMB_IN_GA(x1)) = x1   
POL(U11_aaag(x1, x2, x3)) = 1 + x3   
POL(U17_gga(x1, x2, x3, x4)) = 1 + x4   
POL(U18_ggga(x1, x2, x3, x4)) = x4   
POL(U4_GA(x1, x2, x3)) = 1 + x3   
POL(U6_GA(x1, x2, x3)) = x3   
POL(U8_GA(x1, x2, x3)) = 1 + x2   
POL([]) = 0   
POL(app1cA_in_aaag(x1)) = x1   
POL(app1cA_out_aaag(x1, x2, x3, x4)) = 1 + x1 + x3   
POL(app2cC_out_ggga(x1, x2, x3, x4)) = x4   
POL(app2cD_out_ga(x1, x2)) = 0   
POL(app2cE_in_gga(x1, x2)) = 1 + x1 + x2   
POL(app2cE_out_gga(x1, x2, x3)) = 1 + x3   

The following usable rules [FROCOS05] with respect to the argument filtering of the ordering [JAR06] were oriented:

app1cA_in_aaag(.(X1, X5)) → U11_aaag(X1, X5, app1cA_in_aaag(X5))
app1cA_in_aaag(.(X1, X2)) → app1cA_out_aaag([], X1, X2, .(X1, X2))
app2cE_in_gga(.(X1, X2), X3) → U17_gga(X1, X2, X3, app2cE_in_gga(X2, X3))
app2cE_in_gga([], X1) → app2cE_out_gga([], X1, X1)
U18_ggga(X1, X2, X3, app2cE_out_gga(X2, X3, X4)) → app2cC_out_ggga(X1, X2, X3, .(X1, X4))
U17_gga(X1, X2, X3, app2cE_out_gga(X2, X3, X4)) → app2cE_out_gga(.(X1, X2), X3, .(X1, X4))
U11_aaag(X1, X5, app1cA_out_aaag(X2, X3, X4, X5)) → app1cA_out_aaag(.(X1, X2), X3, X4, .(X1, X5))

(39) Obligation:

Q DP problem:
The TRS P consists of the following rules:

PERMB_IN_GA(.(X1, X2)) → U4_GA(X1, X2, app1cA_in_aaag(X2))
U6_GA(X1, X2, app2cC_out_ggga(X1, X5, X6, X7)) → PERMB_IN_GA(X7)
PERMB_IN_GA(.(X1, X2)) → U8_GA(X1, X2, app2cD_out_ga(X2, X2))

The TRS R consists of the following rules:

app2cE_in_gga(.(X1, X2), X3) → U17_gga(X1, X2, X3, app2cE_in_gga(X2, X3))
app2cE_in_gga([], X1) → app2cE_out_gga([], X1, X1)
U18_ggga(X1, X2, X3, app2cE_out_gga(X2, X3, X4)) → app2cC_out_ggga(X1, X2, X3, .(X1, X4))
U17_gga(X1, X2, X3, app2cE_out_gga(X2, X3, X4)) → app2cE_out_gga(.(X1, X2), X3, .(X1, X4))
app1cA_in_aaag(.(X1, X5)) → U11_aaag(X1, X5, app1cA_in_aaag(X5))
app1cA_in_aaag(.(X1, X2)) → app1cA_out_aaag([], X1, X2, .(X1, X2))
U11_aaag(X1, X5, app1cA_out_aaag(X2, X3, X4, X5)) → app1cA_out_aaag(.(X1, X2), X3, X4, .(X1, X5))

The set Q consists of the following terms:

app1cA_in_aaag(x0)
U11_aaag(x0, x1, x2)
app2cE_in_gga(x0, x1)
U17_gga(x0, x1, x2, x3)
U18_ggga(x0, x1, x2, x3)

We have to consider all (P,Q,R)-chains.

(40) DependencyGraphProof (EQUIVALENT transformation)

The approximation of the Dependency Graph [LPAR04,FROCOS05,EDGSTAR] contains 0 SCCs with 3 less nodes.

(41) TRUE