当前位置:网站首页>Niuke real problem programming - day18
Niuke real problem programming - day18
2022-07-07 14:53:00 【weixin_ forty-five million seven hundred and fifty thousand fou】
Compile environment :c++
1、 Expression legal judgment
describe :
Write a piece of code , Judge one including '{','[','(',')',']','}' Whether the expression of is legal ( Pay attention to the legal rules in the sample .)
You can see a legal expression , The left and right parentheses must correspond to each other .
Given an expression A, Please return one bool value , Represents whether it is legal .
Algorithmic thought :
The title does not give a clear description , You can pass the test without considering the order of the left and right parentheses , Therefore, you only need to judge whether the number of left and right parentheses matches , Left bracket self addition 1, The right bracket is subtracted , If the last count is 0, Then it's legal .
The code part implements :
2、 Remove duplicate characters
describe :
Niuniu has a string of lowercase letters s, stay s There may be some repeated letters in . For example "banana" in , Letter 'a' And letters 'n' Three times and two times respectively .
But Niuniu doesn't like repetition . For the same letter , He just wants to keep the first appearance and delete the following letters . Please help Niuniu finish the right s The operation of .
Algorithmic thought :
Using character conversion ascii Code for the number of times each letter appears , When count is 0 when , Output the string element that appears for the first time .
3、 Fort attack
describe
After Rambo taught Timo , Then discuss the Yodel people with Timo , Talking about the Yodel people , Naturally, there is no shortage of one person , that It's heimerdinger ------ The greatest scientist in the history of the Yodel people . Timo said , Heimodinger has been thinking about a problem recently : Heimerdinger has three forts , The fort can attack at a distance of less than or equal to R The enemy of ( The distance between two points is the linear distance between two points , for example (3,0),(0,4) The distance between them is 5), If a fort can attack To the enemy , Then it will cause 1× The damage of . Heimerdinger put three forts on N*M On the dot in the square , And give the enemy Coordinates of . ask : How much damage will the enemy suffer ?
Algorithmic thought :
The topic has multiple sets of use case input , For each use case input , Record the point coordinates of the corresponding fort and the enemy , Calculate the distance between two points respectively and compare with the range of the fort .
The code part implements :
边栏推荐
- 8大模块、40个思维模型,打破思维桎梏,满足你工作不同阶段、场景的思维需求,赶紧收藏慢慢学
- Several ways of JS jump link
- Deformable convolutional dense network for enhancing compressed video quality
- 激光雷达lidar知识点滴
- Apache multiple component vulnerability disclosure (cve-2022-32533/cve-2022-33980/cve-2021-37839)
- 2022 cloud consulting technology series high availability special sharing meeting
- 激光雷達lidar知識點滴
- What is cloud primordial? This time, I can finally understand!
- 广州开发区让地理标志产品助力乡村振兴
- [today in history] July 7: release of C; Chrome OS came out; "Legend of swordsman" issued
猜你喜欢
用于增强压缩视频质量的可变形卷积密集网络
WebRTC 音频抗弱网技术(上)
CTFshow,信息搜集:web12
What is the process of ⼀ objects from loading into JVM to being cleared by GC?
Bill Gates posted his resume 48 years ago: "it's not as good-looking as yours."
比尔·盖茨晒48年前简历:“没你们的好看”
上半年晋升 P8 成功,还买了别墅!
Niuke real problem programming - day16
leetcode:648. Word replacement [dictionary tree board + find the shortest matching prefix among several prefixes]
In the field of software engineering, we have been doing scientific research for ten years!
随机推荐
Yyds dry goods inventory # solve the real problem of famous enterprises: cross line
WebRTC 音频抗弱网技术(上)
Niuke real problem programming - Day10
Attribute keywords serveronly, sqlcolumnnumber, sqlcomputecode, sqlcomputed
Notes de l'imprimante substance: paramètres pour les affichages Multi - écrans et multi - Résolutions
属性关键字ServerOnly,SqlColumnNumber,SqlComputeCode,SqlComputed
Stm32cubemx, 68 sets of components, following 10 open source protocols
Cvpr2022 | backdoor attack based on frequency injection in medical image analysis
6. Electron borderless window and transparent window lock mode setting window icon
Introduction and use of Kitti dataset
Small game design framework
Discussion on CPU and chiplet Technology
Navigation - are you sure you want to take a look at such an easy-to-use navigation framework?
Several ways of JS jump link
Computer win7 system desktop icon is too large, how to turn it down
【服务器数据恢复】某品牌StorageWorks服务器raid数据恢复案例
ES日志报错赏析-maximum shards open
Five pain points for big companies to open source
Es log error appreciation -maximum shards open
用于增强压缩视频质量的可变形卷积密集网络