zoukankan      html  css  js  c++  java
  • hdu_hpu第八次周赛_1001 To and Fro 201310270918

    To and Fro

    Time Limit : 2000/1000ms (Java/Other)   Memory Limit : 65536/32768K (Java/Other)
    Total Submission(s) : 52   Accepted Submission(s) : 33

    Font: Times New Roman | Verdana | Georgia

    Font Size:

    Problem Description

    Mo and Larry have devised a way of encrypting messages. They first decide secretly on the number of columns and write the message (letters only) down the columns, padding with extra random letters so as to make a rectangular array of letters. For example, if the message is “There’s no place like home on a snowy night” and there are five columns, Mo would write down
    t o i o y h p k n n e l e a i r a h s g e c o n h s e m o t n l e w x
    Note that Mo includes only letters and writes them all in lower case. In this example, Mo used the character ‘x’ to pad the message out to make a rectangle, although he could have used any letter.
    Mo then sends the message to Larry by writing the letters in each row, alternating left-to-right and right-to-left. So, the above would be encrypted as
    toioynnkpheleaigshareconhtomesnlewx
    Your job is to recover for Larry the original message (along with any extra padding letters) from the encrypted one.

    Input

    There will be multiple input sets. Input for each set will consist of two lines. The first line will contain an integer in the range 2. . . 20 indicating the number of columns used. The next line is a string of up to 200 lower case letters. The last input set is followed by a line containing a single 0, indicating end of input.

    Output

    Each input set should generate one line of output, giving the original plaintext message, with no spaces.

    Sample Input

    5
    toioynnkpheleaigshareconhtomesnlewx
    3
    ttyohhieneesiaabss
    0
    

    Sample Output

    theresnoplacelikehomeonasnowynightx
    thisistheeasyoneab
    

    Source

    East Central North America 2004
     
     1 #include <stdio.h>
     2 #include <string.h>
     3 
     4 char str[22][110],s[220];
     5 
     6 int main()
     7 {
     8     int N;
     9     while(scanf("%d",&N),N)
    10     {
    11         int i,j,k,t;
    12         int len;
    13         char c;
    14         memset(str,0,sizeof(str));
    15         memset(s,0,sizeof(s));
    16         getchar();
    17         scanf("%s",s);
    18         len=strlen(s);
    19         k=len/N;t=0;
    20         //puts(s);
    21         //printf("%d %d
    ",N,k);
    22         for(i=0;i<k;i++)
    23         for(j=0;j<N;j++)
    24         {
    25             str[i][j]=s[t++];
    26             //printf("%d ",t);
    27         }
    28         //for(i=0;i<k;i++)
    29         //for(j=0;j<N;j++)
    30         //{
    31         //    printf("%c",str[i][j]);
    32         //}
    33         //puts(str);
    34         for(i=1;i<k;i+=2)
    35         {
    36             for(j=0;j<N/2;j++)
    37             {
    38                 c=str[i][j];
    39                 str[i][j]=str[i][N-j-1];
    40                 str[i][N-j-1]=c;
    41             }
    42         }
    43         for(i=0;i<N;i++)
    44         for(j=0;j<k;j++)
    45         {
    46             printf("%c",str[j][i]);
    47         }
    48         printf("
    ");        
    49     }
    50     return 0;
    51 }

  • 相关阅读:
    数据类型补充
    Kubernetes1.18.5 Cilium安装
    Cilium安装要求
    CentOS内核升级
    临时存储 Ephemeral Storage
    Pod优先级
    kubelet 垃圾回收策略
    Kubernetes Eviction驱逐
    根据PID查看具体的容器
    Kubernetes 资源预留(二)
  • 原文地址:https://www.cnblogs.com/xl1027515989/p/3391703.html
Copyright © 2011-2022 走看看