Skip to main content

Build and visualize orbit graphs for discrete iterations under guarded rules.

Project description

VisIter

Build and visualize orbit graphs for discrete iterations under guarded rules.

VisIter is a small library that does two complementary things:

  1. iterate(start, rules, default=..., max_depth=..., ...) — applies a list of guard-and-operation Rules to seed values via BFS, producing a graph (nodes, edges, per-node depth, optional pseudo-edges marking structural boundaries).

  2. to_dot(graph, ...) — turns the graph into a Graphviz Digraph for SVG/HTML/PDF rendering, with anchor/radius cropping, per-rule edge coloring, wedged-pie node fills for branching nodes, and dashed ghost stubs at every kind of cut boundary.

The two are independent: any graph dict that fits the documented shape can be rendered, and iterate can be used purely for graph construction without ever touching the renderer.

Install

pip install visiter

Graphviz must be available on PATH for image rendering (the Python graphviz package wraps the system tool).

Quickstart — descent with divisor rule

A rule that divides by three when applicable, with a +2 fallback for all other values. Every integer path eventually joins one of two small cycles (1 → 3 → 1, 2 → 4 → 6 → 2).

from visiter import iterate, Op, Rule, to_dot

graph = iterate(
    start=range(1, 30),
    rules=[Rule(lambda x: x % 3 == 0, Op(lambda x: x // 3, "÷3"))],
    default=Op(lambda x: x + 2, "+2"),
)
dot = to_dot(graph, anchor=1, radius=8, direction="backward")
dot.render("descent", format="svg")

Quickstart — reverse binary tree with bound

Generate every positive integer up to a ceiling as the binary tree of ×2 / ×2+1 successors of 1. Rule.bound keeps the expansion inside the ceiling; to_dot draws the frontier as dashed ghost stubs.

from visiter import iterate, Op, Rule, to_dot

ceiling = 64

graph = iterate(
    start=[1],
    rules=[
        Rule(lambda x: True,
             Op(lambda x: 2 * x, "×2"),
             bound=lambda x: 2 * x <= ceiling),
        Rule(lambda x: True,
             Op(lambda x: 2 * x + 1, "×2+1"),
             bound=lambda x: 2 * x + 1 <= ceiling),
    ],
    default=None,
)
dot = to_dot(graph, show_binary=True)
dot.render("binary_tree", format="svg")

CLI

A single visiter command with subcommands. Each subcommand takes its function's keyword arguments as a single Python expression that is eval'd in a namespace where Op, Rule, iterate, and to_dot are pre-bound. Output is JSON (iterate) and DOT (to-dot) on stdout, so they pipe directly:

visiter iterate 'range(1, 30),
                 [Rule(lambda x: x%3==0, Op(lambda x: x//3, "÷3"))],
                 default=Op(lambda x: x+2, "+2")' \
  | visiter to-dot 'anchor=1, radius=8, direction="backward"' \
  | dot -Tsvg > descent.svg

The validate subcommand checks a graph JSON document against the bundled JSON Schema (schemas/v1/graph.schema.json, Draft 2020-12):

pip install visiter[validate]
visiter iterate '...' | visiter validate

The analyze subcommand bridges to NetworkX so you can run any of its hundreds of graph algorithms on the output (cycles, shortest paths, centrality, strongly-connected components, ...) — and when the algorithm returns a NetworkX graph itself, it flows straight back into visiter to-dot:

pip install visiter[analytics]
visiter iterate '...' \
  | visiter analyze 'nx.condensation(graph)' \
  | visiter to-dot '' | dot -Tsvg > scc.svg

Why VisIter?

The short pitch: VisIter is free, scriptable, Graphviz-native, Unix-pipe-composable orbit-graph rendering for discrete iterations under guarded rules — with cutoff boundaries (bounds, depth limits, render crops) as a first-class visual primitive, not silent truncation.

If you have a Mathematica license, NestGraph covers the core BFS. For term rewriting with equational theories, use Maude. For Petri-net reachability, LoLA. For generic graph analytics, NetworkX. For the specific combination of "Python + rule-driven reachability from a seed + opinionated rendering + shell pipes", the niche is small but real.

Full honest comparison against NetworkX, NestGraph, Maude, LoLA, and continuous-dynamics tooling: docs/comparison.md.

Documentation

  • docs/tutorial.md — gentle introduction: what problem the tool solves, smallest example, what each piece does, what the dashed arrows mean. Start here.
  • docs/manual.md — reference: every parameter, every data field, the rendering model in full, design decisions.
  • docs/comparison.md — how VisIter relates to other tools in the ecosystem, and when to pick something else.
  • demos/ — runnable end-to-end examples: make demo writes SVG/PDF/DOT into demos/out/.

License

MIT

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

visiter-0.5.0.tar.gz (53.6 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

visiter-0.5.0-py3-none-any.whl (23.6 kB view details)

Uploaded Python 3

File details

Details for the file visiter-0.5.0.tar.gz.

File metadata

  • Download URL: visiter-0.5.0.tar.gz
  • Upload date:
  • Size: 53.6 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.12.12

File hashes

Hashes for visiter-0.5.0.tar.gz
Algorithm Hash digest
SHA256 d1aa7c9ca1c46459bf3bb6270d0ae3999ce85824342003cffe3ef19da34ca402
MD5 ba8158c150f14c802165a48098df660d
BLAKE2b-256 7b97a6da586353032db4fcf4f9be583cba7dddb2385ec4281e42462ae24a1925

See more details on using hashes here.

File details

Details for the file visiter-0.5.0-py3-none-any.whl.

File metadata

  • Download URL: visiter-0.5.0-py3-none-any.whl
  • Upload date:
  • Size: 23.6 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.12.12

File hashes

Hashes for visiter-0.5.0-py3-none-any.whl
Algorithm Hash digest
SHA256 a03c4e240fd2c3286fa2c20faf43e39d8c1db3ea1dd0da92b506b62789e6da31
MD5 a40f986a7eaaf1091c3ac7426fc0fe36
BLAKE2b-256 5acdc345463a29a2ace5aa24c61d896ee326f9814fa85253e61cff723c583185

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page