Asian Journal of Information Technology

Year: 2015
Volume: 14
Issue: 4
Page No. 117 - 121

On Some Suggested Applications of Sudoku in Information Systems Security

Authors : H.I. Okagbue, Z.O. Omogbadegun, F.A. Olajide and A.A. Opanuga

References

Gunther, J. and T. Moon, 2012. Entropy minimization for solving sudoku. Signal Process, IEEE Trans., 60: 508-513.
CrossRef  |  

Khalid, S.K.A., M.M. Deris and K.M. Mohamad, 2013. Anti-cropping digital image watermarking using sudoku. Int. J. Grid Util. Comput., 4: 169-177.
CrossRef  |  

Lewis, R., 2007. Metaheuristics can solve sudoku puzzles. J. Heuristics, 13: 387-401.
CrossRef  |  

Maire, S. and C. Prissette, 2012. A restarted estimation of distribution algorithm for solving sudoku puzzles. Monte Carlo Methods Appl., 18: 147-160.
CrossRef  |  

Santos-Garcia, G. and M. Palomino, 2007. Solving Sudoku puzzles with rewriting rules. Electron. Notes Theor. Comput. Sci., 176: 79-93.
CrossRef  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved