Solved

Cryptarithmetic

Posted on 2010-11-16
3
1,091 Views
Last Modified: 2012-05-10
Can you further explain these terms, especially in relation to this cryptarithmetic puzzle?


Backtracking: "The term backtracking search is used for a depth first search that chooses values for one variable at a time and backtracks when a variable has no legal moves left to assign."

Forward checking: "Whenever a variable X is assigned, the forward-checking process establishes arc-consistency for it: for each unassigned variable Y that is connected to X by a constraint, delete from Y's domain any value that is inconsistent with the value chosen for X."

MRV: Most constrained variable. "It also has been called the 'most constrained variable' or 'fail-first' heuristic, the latter because it picks a variable that is most likely to cause a failure soon, thereby pruning the search tree. If some variable X has no legal values left, the MRV heuristic will select X and failure will be detected immediately- avoiding pointless searches through other variables."

Least-constraining-value: "Once a variable has been selected, the algorithm must decide on the order in which to examine its values. For this, the least-constraining-value heuristic can be effective in some cases. It prefers the value that rules out the fewest choices for the neighboring variables in the constraint graph."

Information about cryptarithmetic: http://en.wikipedia.org/wiki/Cryptarithmetic
Diagram.PNG
0
Comment
Question by:JCW2
  • 2
3 Comments
 
LVL 15

Expert Comment

by:David L. Hansen
ID: 34147726
0
 
LVL 15

Accepted Solution

by:
David L. Hansen earned 500 total points
ID: 34147748
Sorry that link will likely not work.  Try this one:
http://www.cs.ucc.ie/~gprovan/CS3315-FY08/Lectures/

look for lecture entitled:
"Lecture-12 CSP"
0
 

Author Closing Comment

by:JCW2
ID: 34149325
Thank you for your help.
0

Featured Post

Active Directory Webinar

We all know we need to protect and secure our privileges, but where to start? Join Experts Exchange and ManageEngine on Tuesday, April 11, 2017 10:00 AM PDT to learn how to track and secure privileged users in Active Directory.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Whether you’re a college noob or a soon-to-be pro, these tips are sure to help you in your journey to becoming a programming ninja and stand out from the crowd.
Although it can be difficult to imagine, someday your child will have a career of his or her own. He or she will likely start a family, buy a home and start having their own children. So, while being a kid is still extremely important, it’s also …
In this seventh video of the Xpdf series, we discuss and demonstrate the PDFfonts utility, which lists all the fonts used in a PDF file. It does this via a command line interface, making it suitable for use in programs, scripts, batch files — any pl…

828 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question