Figure 3.50: NFA from Lex program Figure 3.52: Combined Lex NFA Figure 3.54: DFA from Lex program Figure 3.55: NFA implementation of lookahead operator