Search in Medwell
 
 
Asian Journal of Information Technology
Year: 2015 | Volume: 14 | Issue: 4 | Page No.: 117-121
DOI: 10.36478/ajit.2015.117.121  
On Some Suggested Applications of Sudoku in Information Systems Security
H.I. Okagbue, Z.O. Omogbadegun, F.A. Olajide and A.A. Opanuga
 
References
Gunther, J. and T. Moon, 2012. Entropy minimization for solving sudoku. Signal Process, IEEE Trans., 60: 508-513.
CrossRef  |  

Khalid, S.K.A., M.M. Deris and K.M. Mohamad, 2013. Anti-cropping digital image watermarking using sudoku. Int. J. Grid Util. Comput., 4: 169-177.
CrossRef  |  

Lewis, R., 2007. Metaheuristics can solve sudoku puzzles. J. Heuristics, 13: 387-401.
CrossRef  |  

Maire, S. and C. Prissette, 2012. A restarted estimation of distribution algorithm for solving sudoku puzzles. Monte Carlo Methods Appl., 18: 147-160.
CrossRef  |  

Santos-Garcia, G. and M. Palomino, 2007. Solving Sudoku puzzles with rewriting rules. Electron. Notes Theor. Comput. Sci., 176: 79-93.
CrossRef  |