zoukankan      html  css  js  c++  java
  • Safecracker(暴力)

    Safecracker

    Time Limit: 2000/1000 MS (Java/Others)    Memory Limit: 65536/32768 K (Java/Others)
    Total Submission(s): 5240    Accepted Submission(s): 2622

    Problem Description
    === Op tech briefing, 2002/11/02 06:42 CST ===
    "The item is locked in a Klein safe behind a painting in the second-floor library. Klein safes are extremely rare; most of them, along with Klein and his factory, were destroyed in World War II. Fortunately old Brumbaugh from research knew Klein's secrets and wrote them down before he died. A Klein safe has two distinguishing features: a combination lock that uses letters instead of numbers, and an engraved quotation on the door. A Klein quotation always contains between five and twelve distinct uppercase letters, usually at the beginning of sentences, and mentions one or more numbers. Five of the uppercase letters form the combination that opens the safe. By combining the digits from all the numbers in the appropriate way you get a numeric target. (The details of constructing the target number are classified.) To find the combination you must select five letters v, w, x, y, and z that satisfy the following equation, where each letter is replaced by its ordinal position in the alphabet (A=1, B=2, ..., Z=26). The combination is then vwxyz. If there is more than one solution then the combination is the one that is lexicographically greatest, i.e., the one that would appear last in a dictionary."

    v - w^2 + x^3 - y^4 + z^5 = target

    "For example, given target 1 and letter set ABCDEFGHIJKL, one possible solution is FIECB, since 6 - 9^2 + 5^3 - 3^4 + 2^5 = 1. There are actually several solutions in this case, and the combination turns out to be LKEBA. Klein thought it was safe to encode the combination within the engraving, because it could take months of effort to try all the possibilities even if you knew the secret. But of course computers didn't exist then."

    === Op tech directive, computer division, 2002/11/02 12:30 CST ===

    "Develop a program to find Klein combinations in preparation for field deployment. Use standard test methodology as per departmental regulations. Input consists of one or more lines containing a positive integer target less than twelve million, a space, then at least five and at most twelve distinct uppercase letters. The last line will contain a target of zero and the letters END; this signals the end of the input. For each line output the Klein combination, break ties with lexicographic order, or 'no solution' if there is no correct combination. Use the exact format shown below."
     
    Sample Input
    1 ABCDEFGHIJKL 11700519 ZAYEXIWOVU 3072997 SOUGHT 1234567 THEQUICKFROG 0 END
     
    Sample Output
    LKEBA YOXUZ GHOST no solution
     
    Source
     
    Recommend
    JGShining
     

    Statistic | Submit | Discuss | Note


    这题估计是数据弱了。。。五重循环不超时。

     1 #include <iostream>
     2 #include <cstdio>
     3 #include <algorithm>
     4 #include <cstring>
     5 using namespace std;
     6 
     7 char s[15];
     8 bool vis[15], tag;
     9 int t, len;
    10 
    11 int Cal(int y, int w, int v, int x, int z)
    12 {
    13     v -= 64, w -= 64, x -= 64, y -= 64, z -= 64;
    14     return (v - w*w + x*x*x - y*y*y*y + z*z*z*z*z);
    15 }
    16 
    17 int main()
    18 {
    19     while(scanf("%d %s", &t, s))
    20     {
    21         len = strlen(s);
    22         if(t == 0 && !strcmp(s,"END")) break;
    23         tag = true;
    24         //将可选序列按升序排列
    25         for(int i = 1; i < len && tag; i++)
    26         {
    27             for(int j = 0, tag = false; j < len - i; j++)
    28             {
    29                 if(s[j] < s[j + 1])
    30                 {
    31                     swap(s[j], s[j + 1]);
    32                     tag = true;
    33                 }
    34             }
    35         }
    36         for(int i = 0; i < len; i++) vis[i] = false;
    37         //若target在值域之外,no solution
    38         if(Cal(s[0], s[1], s[len - 3], s[len - 2], s[len - 1]) > t || Cal(s[len - 1], s[len - 2], s[2], s[1], s[0]) < t)
    39             puts("no solution");
    40         else
    41         {
    42             int a, b, c, d, e;
    43             tag = false;
    44             for(a = 0; a < len; a++)
    45             {
    46                 vis[a] = true;
    47                 for(b = 0; b < len; b++)
    48                 {
    49                     if(!vis[b])
    50                     {
    51                         vis[b] = true;
    52                         for(c = 0; c < len; c++)
    53                         {
    54                             if(!vis[c])
    55                             {
    56                                 vis[c] = true;
    57                                 for(d = 0; d < len; d++)
    58                                 {
    59                                     if(!vis[d])
    60                                     {
    61                                         vis[d] = true;
    62                                         for(e = 0; e < len; e++)
    63                                             if(!vis[e] && Cal(s[d], s[b], s[a], s[c], s[e]) == t)
    64                                             {
    65                                                 tag = true;
    66                                                 goto end;
    67                                             }
    68                                         vis[d] = false;
    69                                     }
    70                                 }
    71                                 vis[c] = false;
    72                             }
    73                         }
    74                         vis[b] = false;
    75                     }
    76                 }
    77                 vis[a] = false;
    78             }
    79             end:
    80             if(!tag) puts("no solution");
    81             else printf("%c%c%c%c%c\n", s[a], s[b], s[c], s[d], s[e]);
    82         }
    83     }
    84     return 0;
    85 }
  • 相关阅读:
    性能测试,负载测试,压力测试,容量测试的区别
    全文检索引擎Solr系列——整合MySQL、MongoDB
    全文检索引擎Solr系列——整合中文分词组件IKAnalyzer
    全文检索引擎Solr系列——整合中文分词组件mmseg4j
    全文检索引擎Solr系列——Solr核心概念、配置文件
    全文检索引擎Solr系列—–全文检索基本原理
    ES之一:Elasticsearch6.4 windows安装 head插件ik分词插件安装
    FTP,FTPS,FTPS与防火墙
    NGINX通过Stream转发ftp请求
    nginx 的第三方模块ngx_http_accesskey_module 来实现下载文件的防盗链步骤(linux系统下)
  • 原文地址:https://www.cnblogs.com/cszlg/p/2910400.html
Copyright © 2011-2022 走看看