Solved

Cryptarithmetic

Posted on 2010-11-16
3
1,074 Views
Last Modified: 2012-05-10
Can you further explain these terms, especially in relation to this cryptarithmetic puzzle?


Backtracking: "The term backtracking search is used for a depth first search that chooses values for one variable at a time and backtracks when a variable has no legal moves left to assign."

Forward checking: "Whenever a variable X is assigned, the forward-checking process establishes arc-consistency for it: for each unassigned variable Y that is connected to X by a constraint, delete from Y's domain any value that is inconsistent with the value chosen for X."

MRV: Most constrained variable. "It also has been called the 'most constrained variable' or 'fail-first' heuristic, the latter because it picks a variable that is most likely to cause a failure soon, thereby pruning the search tree. If some variable X has no legal values left, the MRV heuristic will select X and failure will be detected immediately- avoiding pointless searches through other variables."

Least-constraining-value: "Once a variable has been selected, the algorithm must decide on the order in which to examine its values. For this, the least-constraining-value heuristic can be effective in some cases. It prefers the value that rules out the fewest choices for the neighboring variables in the constraint graph."

Information about cryptarithmetic: http://en.wikipedia.org/wiki/Cryptarithmetic
Diagram.PNG
0
Comment
Question by:JCW2
  • 2
3 Comments
 
LVL 15

Expert Comment

by:David L. Hansen
ID: 34147726
0
 
LVL 15

Accepted Solution

by:
David L. Hansen earned 500 total points
ID: 34147748
Sorry that link will likely not work.  Try this one:
http://www.cs.ucc.ie/~gprovan/CS3315-FY08/Lectures/

look for lecture entitled:
"Lecture-12 CSP"
0
 

Author Closing Comment

by:JCW2
ID: 34149325
Thank you for your help.
0

Featured Post

What Security Threats Are You Missing?

Enhance your security with threat intelligence from the web. Get trending threat insights on hackers, exploits, and suspicious IP addresses delivered to your inbox with our free Cyber Daily.

Join & Write a Comment

Suggested Solutions

Title # Comments Views Activity
Fibonacci challenge 11 82
Specific format 21 140
stringclean challenge 26 56
Help to convert powershell script into a gui 9 74
Article by: Nicole
This is a research brief on the potential colonization of humans on Mars.
Lithium-ion batteries area cornerstone of today's portable electronic devices, and even though they are relied upon heavily, their chemistry and origin are not of common knowledge. This article is about a device on which every smartphone, laptop, an…
An introduction to basic programming syntax in Java by creating a simple program. Viewers can follow the tutorial as they create their first class in Java. Definitions and explanations about each element are given to help prepare viewers for future …
Viewers will learn how to properly install Eclipse with the necessary JDK, and will take a look at an introductory Java program. Download Eclipse installation zip file: Extract files from zip file: Download and install JDK 8: Open Eclipse and …

708 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now