Ajò Dimonios wrote:The chain - (2 = 4,5,1,6) r5c3479 means that r5c79 ≠ 2 implies that 1,4,5,6 are present in cells r5c3479
Yes, but it doesn't mean
just that. Didn't you stop to wonder why it was written with the commas instead of just (2=1456)r5c3479? The commas imply specific cell assignments for the digits in the listed order. In other words:
(4,5,1,6)r5c3479 <-> (4r5c3 & 5r5c4 & 1r5c7 & 6r5c9)
Without the commas the digit order is not explicitly specified, and the following weak link would be harder to understand. Technically it would still be valid in this case, because there's only one possible permutation for the digits (1456) in those four cells. However, it requires more effort from the reader to verify, so eleven's choice of using the commas was good for clarity. It's also safer, because in many other similar situations the weak link wouldn't even work without the commas.
if we want to be more precise the only certain information is that r5c7 = 1
No. Commas or not, all four digits get locked into specific cells, most crucially 1r5c7 and 6r5c9, which are both needed for the following weak link. It is commonly understood that ALS-terms imply such internal arrangement logic based on the possible permutations of the locked set. Thus, this is perfectly correct:
- Code: Select all
2r5c1 - (2=4,5,1,6)r5c3479 - (1|6)r4c789
An alternate way to write that part:
- Code: Select all
2r5c1 - 2r5c7|6r5c1 = 16r5c79 - (1|6)r4c789
Both ways 16 gets locked into r5c79 as needed (when read from left to right). The latter just makes it more explicit.
That enables the next weak link to erase
both 1 and 6 from r4c789. If you thought it would only erase one or the other (because of the OR-symbol) you were wrong. I'm almost certain that you did, because it's the most common mistake. Like I said, some things aren't very intuitive, until you understand the reasons behind them. In this case I suggest you take a look at
De Morgan's Laws.
--
Btw, you're insulting
eleven if you're even suggesting he used a memory chain. I don't think I've ever seen him use a memory chain. Besides, memory chains can be easily recognized because they should be marked with memory markers (usually *, ^, %, etc). If a chain doesn't have those, it should be a valid AIC (no memories) unless otherwise specified.