zoukankan      html  css  js  c++  java
  • POJ-2039 To and Fro

    To and Fro
    Time Limit: 1000MS Memory Limit: 30000K
    Total Submissions: 8694 Accepted: 5847
    Description

    Mo and Larry have devised a way of encrypting messages. They first decide secretly on the number of columns and write the message (letters only) down the columns, padding with extra random letters so as to make a rectangular array of letters. For example, if the message is “There’s no place like home on a snowy night” and there are five columns, Mo would write down
    t o i o y

    h p k n n

    e l e a i

    r a h s g

    e c o n h

    s e m o t

    n l e w x

    Note that Mo includes only letters and writes them all in lower case. In this example, Mo used the character “x” to pad the message out to make a rectangle, although he could have used any letter.

    Mo then sends the message to Larry by writing the letters in each row, alternating left-to-right and right-to-left. So, the above would be encrypted as

    toioynnkpheleaigshareconhtomesnlewx

    Your job is to recover for Larry the original message (along with any extra padding letters) from the encrypted one.
    Input

    There will be multiple input sets. Input for each set will consist of two lines. The first line will contain an integer in the range 2… 20 indicating the number of columns used. The next line is a string of up to 200 lower case letters. The last input set is followed by a line containing a single 0, indicating end of input.
    Output

    Each input set should generate one line of output, giving the original plaintext message, with no spaces.
    Sample Input

    5
    toioynnkpheleaigshareconhtomesnlewx
    3
    ttyohhieneesiaabss
    0
    Sample Output

    theresnoplacelikehomeonasnowynightx
    thisistheeasyoneab

    #include <iostream>
    #include <string.h>
    #include <algorithm>
    #include <math.h>
    #include <stdlib.h>
    
    using namespace std;
    char a[205];
    char b[25][25];
    int n;
    int main()
    {
        while(scanf("%d",&n)!=EOF)
        {
            if(n==0)
                break;
            scanf("%s",a);
            int len=strlen(a);
            for(int i=0;i<len;i++)
            {
                if((i/n)%2==0)
                  b[i/n][i%n]=a[i];
                if((i/n)%2==1)
                {
                    b[i/n][n-i%n-1]=a[i];
                }
    
            }
            int len2=len/n;
            for(int i=0;i<n;i++)
                for(int j=0;j<len2;j++)
                    printf("%c",b[j][i]);
            printf("
    ");
        }
        return 0;
    }
  • 相关阅读:
    keras环境搭建
    通过程序自动设置网卡的“internet共享”选项
    编译pjsip源码
    电商开发必备,淘宝商品和类目体系是如何设计的
    pom.xml成了普通xml文件
    springboot application.properties不生效
    SpringBoot进阶教程(七十二)整合Apollo
    SpringBoot进阶教程(七十一)详解Prometheus+Grafana
    SpringBoot进阶教程(七十)SkyWalking
    Java8 lamda表达式
  • 原文地址:https://www.cnblogs.com/dacc123/p/8228815.html
Copyright © 2011-2022 走看看