zoukankan      html  css  js  c++  java
  • UVA 350 Pseudo-Random Numbers

     

     Pseudo-Random Numbers 

    Computers normally cannot generate really random numbers, but frequently are used to generate sequences of pseudo-random numbers. These are generated by some algorithm, but appear for all practical purposes to be really random. Random numbers are used in many applications, including simulation.

    A common pseudo-random number generation technique is called the linear congruential method. If the last pseudo-random number generated was L, then the next number is generated by evaluating ( tex2html_wrap_inline32 , where Z is a constant multiplier, I is a constant increment, and M is a constant modulus. For example, suppose Z is 7, I is 5, and M is 12. If the first random number (usually called the seed) is 4, then we can determine the next few pseudo-random numbers are follows:

    tabular21

    As you can see, the sequence of pseudo-random numbers generated by this technique repeats after six numbers. It should be clear that the longest sequence that can be generated using this technique is limited by the modulus, M.

    In this problem you will be given sets of values for Z, I, M, and the seed, L. Each of these will have no more than four digits. For each such set of values you are to determine the length of the cycle of pseudo-random numbers that will be generated. But be careful: the cycle might not begin with the seed!

    Input

    Each input line will contain four integer values, in order, for Z, I, M, and L. The last line will contain four zeroes, and marks the end of the input data. L will be less than M.

    Output

    For each input line, display the case number (they are sequentially numbered, starting with 1) and the length of the sequence of pseudo-random numbers before the sequence is repeated.

    Sample Input

    7 5 12 4
    5173 3849 3279 1511
    9111 5309 6000 1234
    1079 2136 9999 1237
    0 0 0 0

    Sample Output

    Case 1: 6
    Case 2: 546
    Case 3: 500
    Case 4: 220
     1 #include<iostream>  
     2 #include<string.h>  
     3 #include<stdio.h>  
     4 #include<ctype.h>  
     5 #include<algorithm>  
     6 #include<stack>  
     7 #include<queue>  
     8 #include<set>  
     9 #include<math.h>  
    10 #include<vector>  
    11 #include<map>  
    12 #include<deque>      
    13 #include<list>  
    14 using namespace std;
    15 int a[1000000];  
    16       
    17 int main()  
    18     {  
    19         int Z,I,M,L,t=0;  
    20         while ( scanf("%d%d%d%d",&Z,&I,&M,&L)) 
    21         {
    22         t=t+1;
    23         if (Z*I*M*L==0)
    24         break;  
    25         memset(a,0,sizeof(a));  
    26         int k=0;  
    27         L=(Z*L+I)%M;  
    28         while(!a[L]) 
    29         {  
    30             k=k+1;  
    31             a[L] = 1;  
    32             L = (Z*L+I)%M;  
    33         }  
    34         printf("Case %d: %d
    ",t,k);  
    35     }  
    36   return 0;  
    37 }  
    View Code
  • 相关阅读:
    Spring Security -- 添加图形验证码(转载)
    Spring Security -- 自定义用户认证(转载)
    pandas agg 后降低df表层
    判断是否有人跟踪车辆的方案
    格隆汇笔记-黄勇演讲
    Mac mysql 忘记root密码的解决方法
    sql 同步2个表中的一个字段数据
    Linux下配置用msmtp和mutt发邮件
    spark StructType的应用,用在处理mongoDB keyvalue
    Idea2018旗舰版破解方法
  • 原文地址:https://www.cnblogs.com/qscqesze/p/3864852.html
Copyright © 2011-2022 走看看