zoukankan      html  css  js  c++  java
  • Poj 1611 The Suspects

    The Suspects
    Time Limit: 1000MS   Memory Limit: 20000K
    Total Submissions: 14589   Accepted: 6957

    Description

    Severe acute respiratory syndrome (SARS), an atypical pneumonia of unknown aetiology, was recognized as a global threat in mid-March 2003. To minimize transmission to others, the best strategy is to separate the suspects from others.
    In the Not-Spreading-Your-Sickness University (NSYSU), there are many student groups. Students in the same group intercommunicate with each other frequently, and a student may join several groups. To prevent the possible transmissions of SARS, the NSYSU collects the member lists of all student groups, and makes the following rule in their standard operation procedure (SOP).
    Once a member in a group is a suspect, all members in the group are suspects.
    However, they find that it is not easy to identify all the suspects when a student is recognized as a suspect. Your job is to write a program which finds all the suspects.

    Input

    The input file contains several cases. Each test case begins with two integers n and m in a line, where n is the number of students, and m is the number of groups. You may assume that 0 < n <= 30000 and 0 <= m <= 500. Every student is numbered by a unique integer between 0 and n−1, and initially student 0 is recognized as a suspect in all the cases. This line is followed by m member lists of the groups, one line per group. Each line begins with an integer k by itself representing the number of members in the group. Following the number of members, there are k integers representing the students in this group. All the integers in a line are separated by at least one space.
    A case with n = 0 and m = 0 indicates the end of the input, and need not be processed.

    Output

    For each case, output the number of suspects in one line.

    Sample Input

    100 4
    2 1 2
    5 10 13 11 12 14
    2 0 1
    2 99 2
    200 2
    1 5
    5 1 2 3 4 5
    1 0
    0 0

    Sample Output

    4
    1
    1

    Source

     
    #include <iostream>
    #include <stdio.h>
    #include <string.h>
    #define N 30003
    using namespace std;
    int f[N],c[N];
    int n;
    void init()
    {
        int i;
        for(i=0;i<n;i++)
          f[i]=i,c[i]=1;
    }
    int find_set(int x)
    {
        if(x!=f[x])
         {
             return f[x]=find_set(f[x]);
         }
         return x;
    }
    void unin_set(int x,int y)
    {
        x=find_set(x);
        y=find_set(y);
        if(x==y) return ;
        if(x<y)
        {
            f[y]=x;
            c[x]+=c[y];
        }
        else
        {
            f[x]=y;
            c[y]+=c[x];
        }
    }
    int main()
    {
        int m,k,x,y;
        while(scanf("%d%d",&n,&m),n||m)
        {
            if(!m)
              printf("%d\n",n);
            else
            {   init();
                while(m--)
                {
                    scanf("%d",&k);
                    scanf("%d",&x);
                    k--;
                    while(k--)
                    {
                       scanf("%d",&y);
                       unin_set(x,y);
                       x=y;
                    }
                }
                printf("%d\n",c[0]);
            }
        }
        return 0;
    }
  • 相关阅读:
    【SQL注入】之SQLMAP工具的使用
    【漏洞复现】之PHP-FRM远程代码执行漏洞(CVE-2019-11043)复现
    利用PHPStudy搭建伪静态页面
    【渗透测试小白系列】之利用PHPMyAdmin Getshell
    【渗透测试小白系列】之Docker入门以及漏洞环境搭建
    web服务器是什莫: tomcat各个目录简介
    equals和==的区别
    ln命令
    head tail ln sort uniq指令
    rpm包安装
  • 原文地址:https://www.cnblogs.com/372465774y/p/2571976.html
Copyright © 2011-2022 走看看