?
Solved

solve this 3 x 2 sliding block puzzle in fewest moves.

Posted on 2013-01-07
6
Medium Priority
?
1,990 Views
Last Modified: 2013-01-08
Given the following sliding blocks:  (b = a blank space to move blocks)

1   B
5   4
3   6


Re-arrange the 5 and the 3 in the fewest moves.  so that it looks like this:

1   B
3   4
5   6


Post the solution as 1R, 5U  (i.e. move the 1 block right.  Move the 5 block Up, etc.)
Would love someone to explain to me the logic in solving this.  I'm stuck!
0
Comment
Question by:arthurh88
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 3
6 Comments
 
LVL 84

Expert Comment

by:ozo
ID: 38753739
Not possible.
The requested re-arrangement requires an odd number of swaps,
But getting B back to its starting position requires an even number of swaps.
0
 

Author Comment

by:arthurh88
ID: 38753820
is it possible then to get
B   1
3    4
5    6

?


The key for me is the 3, 4, 5, 6 in the right positions
0
 
LVL 84

Expert Comment

by:ozo
ID: 38753854
No.
0
Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

 

Author Comment

by:arthurh88
ID: 38753861
ok can you please help me understand why?   how do you know the even/odd thing?   is there an explanation that might make sense to a laymen?
0
 
LVL 84

Accepted Solution

by:
ozo earned 2000 total points
ID: 38754252
0
 

Author Comment

by:arthurh88
ID: 38755680
wow thanks.  i searched wikipedia for "sliding block puzzle" but didn't know what it was really called.
0

Featured Post

Ransomware Attacks Keeping You Up at Night?

Will your organization be ransomware's next victim?  The good news is that these attacks are predicable and therefore preventable. Learn more about how you can  stop a ransomware attacks before encryption takes place with our Ransomware Prevention Kit!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article lists the top 5 free OST to PST Converter Tools. These tools save a lot of time for users when they want to convert OST to PST after their exchange server is no longer available or some other critical issue with exchange server or impor…
This article will show how Aten was able to supply easy management and control for Artear's video walls and wide range display configurations of their newsroom.
In this brief tutorial Pawel from AdRem Software explains how you can quickly find out which services are running on your network, or what are the IP addresses of servers responsible for each service. Software used is freeware NetCrunch Tools (https…
Add bar graphs to Access queries using Unicode block characters. Graphs appear on every record in the color you want. Give life to numbers. Hopes this gives you ideas on visualizing your data in new ways ~ Create a calculated field in a query: …
Suggested Courses

752 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question