subject

Constraint satisfaction problems: simple Sudoku This problem asks you to solve a simplified version of a Sudoku puzzle. The board is a 4-by-4 square, and each box can have a number from 1 through 4. One number can only appear once in each row and column. Furthermore, in each group of 2-by-2 boxes outlined with a solid border, each of the 4 numbers may only appear once as well. For example, in the boxes a, b, e, and f, each of the numbers 1 through 4 may only appear once. Note that the diagonals do not necessarily need to have each of the numbers 1 through 4. Notice that the board already has some boxes filled out: Box b = 4, c = 2, g = 3,1 = 2, and o= 1. а b 4 с 2 d
e f g 3 h
i j k l 2
m n 0 1 p
We represent this simple Sudoku puzzle as a CSP with the following constraints:
1. Each box can only take on values 1, 2, 3, or 4.
2. 1, 2, 3, and 4 may only appear once in each row.
3. 1, 2, 3, and 4 may only appear once in each column.
4. 1, 2, 3, and 4 may only appear once in each set of 2-by-2 boxes with solid borders.
5. b = 4, c = 2, g = 3,1=2, and o = 1.
1. Write down the math representation for the constraint "value 1 must and must only appear once in the first row". You may use the variables a, b, c,...,p and logical connectors (1, V, -, etc) to represent the constraint. To give some hints, the constraint "value 1 must appear in the first row" can be represented as "a = 1Vd=1".
2. Write down the math representation for the constraint "value 3 must and must only appear once in the first column". You may use the variables a, b, c, ... ,p and logical connectors (^, V, 7, etc) to represent the constraint.
3. Write down the math representation for the constraint "value 2 must and must only appear once in the first group of 2-by-2 boxes". You may use the variables a, b, c, ... ,p and logical connectors (A, V, -, etc) to represent the constraint.
4. Consider a naive backtracking algorithm using only forward checking. Assume that the backtracking algorithm solves the board from left to right, top to bottom, and enforces all unary constraints along the way (e. g., b is assigned to 4 already, etc). In the first step, 3 is assigned to box a. Using forward checking, what are the boxes whose domains will be affected by the assignment of box a? (In this problem, d, e, f,...,p are the variables represent the values assigned to boxes. You do not need to include the boxes whose values are already fixed in the answer.)
5. Following the last question, what are the possible value assignments of each affected box?

ansver
Answers: 2

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 02:00
Aisha has finished working on a word processing document that contains 15 pages. she has added some special elements in the first three pages, page 9 and 10, and page 15 from the document. she wants to print only these pages to see how they look. which option is the correct way to represent (in the print dialog box) the pages that aisha wants to print?
Answers: 1
question
Computers and Technology, 22.06.2019 10:00
Wich technology can a website use to allow you to listen to a concert live over the internet?
Answers: 3
question
Computers and Technology, 22.06.2019 12:50
You have just been hired as an information security engineer for a large, multi-international corporation. unfortunately, your company has suffered multiple security breaches that have threatened customers' trust in the fact that their confidential data and financial assets are private and secured. credit-card information was compromised by an attack that infiltrated the network through a vulnerable wireless connection within the organization. the other breach was an inside job where personal data was stolen because of weak access-control policies within the organization that allowed an unauthorized individual access to valuable data. your job is to develop a risk-management policy that addresses the two security breaches and how to mitigate these risks.requirementswrite a brief description of the case study. it requires two to three pages, based upon the apa style of writing. use transition words; a thesis statement; an introduction, body, and conclusion; and a reference page with at least two references. use a double-spaced, arial font, size 12.
Answers: 1
question
Computers and Technology, 22.06.2019 21:30
Write a function named printfloatrepresentation(float number) that will print the floating point representation of a number using the format given below. (sign bit) exponent in binary (assumed bit).significandfor example if the number passed an argument is 71 yourprogram should print (0) 10000101 (1).00011100000000000000000similarly if the number passed to the function as argument is -71 the program should print (1) 10000101 (1).00011100000000000000000
Answers: 3
You know the right answer?
Constraint satisfaction problems: simple Sudoku This problem asks you to solve a simplified version...
Questions
question
Mathematics, 18.01.2020 08:31
question
History, 18.01.2020 08:31
question
Mathematics, 18.01.2020 08:31