zoukankan      html  css  js  c++  java
  • POJ-2039 To and Fro

    To and Fro
    Time Limit: 1000MS Memory Limit: 30000K
    Total Submissions: 8694 Accepted: 5847
    Description

    Mo and Larry have devised a way of encrypting messages. They first decide secretly on the number of columns and write the message (letters only) down the columns, padding with extra random letters so as to make a rectangular array of letters. For example, if the message is “There’s no place like home on a snowy night” and there are five columns, Mo would write down
    t o i o y

    h p k n n

    e l e a i

    r a h s g

    e c o n h

    s e m o t

    n l e w x

    Note that Mo includes only letters and writes them all in lower case. In this example, Mo used the character “x” to pad the message out to make a rectangle, although he could have used any letter.

    Mo then sends the message to Larry by writing the letters in each row, alternating left-to-right and right-to-left. So, the above would be encrypted as

    toioynnkpheleaigshareconhtomesnlewx

    Your job is to recover for Larry the original message (along with any extra padding letters) from the encrypted one.
    Input

    There will be multiple input sets. Input for each set will consist of two lines. The first line will contain an integer in the range 2… 20 indicating the number of columns used. The next line is a string of up to 200 lower case letters. The last input set is followed by a line containing a single 0, indicating end of input.
    Output

    Each input set should generate one line of output, giving the original plaintext message, with no spaces.
    Sample Input

    5
    toioynnkpheleaigshareconhtomesnlewx
    3
    ttyohhieneesiaabss
    0
    Sample Output

    theresnoplacelikehomeonasnowynightx
    thisistheeasyoneab

    #include <iostream>
    #include <string.h>
    #include <algorithm>
    #include <math.h>
    #include <stdlib.h>
    
    using namespace std;
    char a[205];
    char b[25][25];
    int n;
    int main()
    {
        while(scanf("%d",&n)!=EOF)
        {
            if(n==0)
                break;
            scanf("%s",a);
            int len=strlen(a);
            for(int i=0;i<len;i++)
            {
                if((i/n)%2==0)
                  b[i/n][i%n]=a[i];
                if((i/n)%2==1)
                {
                    b[i/n][n-i%n-1]=a[i];
                }
    
            }
            int len2=len/n;
            for(int i=0;i<n;i++)
                for(int j=0;j<len2;j++)
                    printf("%c",b[j][i]);
            printf("
    ");
        }
        return 0;
    }
  • 相关阅读:
    54:代码审计-TP5框架审计写法分析及代码追踪
    53:代码审计-TP5框架及无框架变量覆盖反序列化
    52:代码审计-PHP项目类RCE及文件包含下载删除
    51:代码审计-PHP框架MVC类上传断点调试挖掘
    支配树学习笔记
    模拟费用流学习笔记
    python之元类、双下方法( 双下方法也叫魔术方法、 内置方法)
    java 注解
    java 反射
    java synchronized
  • 原文地址:https://www.cnblogs.com/dacc123/p/8228815.html
Copyright © 2011-2022 走看看