- Code: Select all
*-----------*
|..4|.5.|9..|
|...|.7.|..6|
|37.|...|..2|
|---+---+---|
|..9|5..|.8.|
|..1|2.4|3..|
|.6.|..9|2..|
|---+---+---|
|2..|...|.93|
|1..|.4.|...|
|..6|.2.|7..|
*-----------*
Basic methods will take the grid to this point.
- Code: Select all
6 *18* 4 |*3* 5 2 | 9 7 *18*
59 189 2 | 4 7 18 | 58 3 6
3 7 58 | 6 9 18 | 458 145 2
-----------------+---------------+-----------------
4 2 9 | 5 3 6 | 1 8 7
7 5 1 | 2 8 4 | 3 6 9
8 6 3 | 7 1 9 | 2 45 45
-----------------+---------------+-----------------
2 -48- 578 | 1 6 57 | 458 9 3
1 *389* #578#|*89* 4 357 | 6 2 *58*
59 *3489* 6 |*89* 2 35 | 7 145 *1458*
An 8's filet-o-fish swordfish in r189c249 (fin in r8c3) kills 8 in r7c2. This solves for a couple 4's and takes the grid to the following point.
- Code: Select all
6 18 4 | 3 5 2 | 9 7 18
*59* 189 2 | 4 7 18 |*58* 3 6
3 7 58 | 6 9 18 | 4 15 2
-----------------+---------------+-----------------
4 2 9 | 5 3 6 | 1 8 7
7 5 1 | 2 8 4 | 3 6 9
8 6 3 | 7 1 9 | 2 45 45
-----------------+---------------+-----------------
*2* 4 -578-| 1 6 57 |*58* 9 3
1 389 578 | 89 4 357 | 6 2 58
#59# 389 6 | 89 2 35 | 7 14 14
From here, a sashimi x-wing for 5's in r27c17 (fin r9c1) kills candidate 5 in r7c3. This opens the way for a normal 5's swordfish in r279c167 to eliminate the 5 in r8c6. Now the grid looks like this
- Code: Select all
6 18 4 | 3 5 2 | 9 7 18
59 189 2 | 4 7 18 | 58 3 6
3 7 58 | 6 9 18 | 4 15 2
-----------------+---------------+-----------------
4 2 9 | 5 3 6 | 1 8 7
7 5 1 | 2 8 4 | 3 6 9
8 6 3 | 7 1 9 | 2 45 45
-----------------+---------------+-----------------
2 4 78 | 1 6 57 | 58 9 3
1 389 578 | 89 4 37 | 6 2 58
59 389 6 | 89 2 35 | 7 14 14
Now we will put POM labels on just the 5's and 7's in this grid. Since the 5's and the 7's appear exactly twice in each box, we know there can't be more than 2 potential solution patterns for each of them. They are the same patterns that you would get from simple coloring. So labeling them 'A' and 'B' for each, we get the following.
- Code: Select all
6 18 4 | 3 5 2 | 9 7 18
5B9 189 2 | 4 7 18 | 5A8 3 6
3 7 5A8 | 6 9 18 | 4 15B 2
------------------+---------------+-----------------
4 2 9 | 5 3 6 | 1 8 7
7 5 1 | 2 8 4 | 3 6 9
8 6 3 | 7 1 9 | 2 45A 45B
------------------+---------------+-----------------
2 4 7A8 | 1 6 5A7B| 5B8 9 3
1 389 5B7B8| 89 4 37A | 6 2 5A8
5A9 389 6 | 89 2 35B | 7 14 14
A pair of cells which contain all of the potential patterns for a number, I call a vulnerable pair. You can note by inspection that in r8c3 and r7c6, the 7B pattern occupies cells containing both of 5's patterns. This means that if 7B were true, then 5's could not possibly have a valid pattern. Thus we can eliminate 7B, which basicly solves the puzzle.
Of course this puzzle could have been solved dozens of other ways, but it does show one of the basic POM operations quite nicely.