当前位置:网站首页>Codeforces 474 F. Ant colony
Codeforces 474 F. Ant colony
2022-07-07 20:03:00 【全栈程序员站长】
大家好,又见面了,我是全栈君。
线段树求某一段的GCD…..
F. Ant colony
time limit per test
1 second
memory limit per test
256 megabytes
input
standard input
output
standard output
Mole is hungry again. He found one ant colony, consisting of n ants, ordered in a row. Each ant i (1 ≤ i ≤ n) has a strength si.
In order to make his dinner more interesting, Mole organizes a version of «Hunger Games» for the ants. He chooses two numbers l and r(1 ≤ l ≤ r ≤ n) and each pair of ants with indices between l and r (inclusively) will fight. When two ants i and j fight, ant i gets one battle point only if si divides sj (also, ant j gets one battle point only if sj divides si).
After all fights have been finished, Mole makes the ranking. An ant i, with vi battle points obtained, is going to be freed only if vi = r - l, or in other words only if it took a point in every fight it participated. After that, Mole eats the rest of the ants. Note that there can be many ants freed or even none.
In order to choose the best sequence, Mole gives you t segments [li, ri] and asks for each of them how many ants is he going to eat if those ants fight.
Input
The first line contains one integer n (1 ≤ n ≤ 105), the size of the ant colony.
The second line contains n integers s1, s2, …, sn (1 ≤ si ≤ 109), the strengths of the ants.
The third line contains one integer t (1 ≤ t ≤ 105), the number of test cases.
Each of the next t lines contains two integers li and ri (1 ≤ li ≤ ri ≤ n), describing one query.
Output
Print to the standard output t lines. The i-th line contains number of ants that Mole eats from the segment [li, ri].
Sample test(s)
input
5
1 3 2 4 2
4
1 5
2 5
3 5
4 5output
4
4
1
1Note
In the first test battle points for each ant are v = [4, 0, 2, 0, 2], so ant number 1 is freed. Mole eats the ants 2, 3, 4, 5.
In the second test case battle points are v = [0, 2, 0, 2], so no ant is freed and all of them are eaten by Mole.
In the third test case battle points are v = [2, 0, 2], so ants number 3 and 5 are freed. Mole eats only the ant 4.
In the fourth test case battle points are v = [0, 1], so ant number 5 is freed. Mole eats the ant 4.
#include <iostream>
#include <cstdio>
#include <cstring>
#include <algorithm>
#include <map>
#include <vector>
using namespace std;
const int maxn=100100;
typedef pair<int,int> pII;
pII b[maxn];
int n,s[maxn];
int g[maxn<<2];
int gcd(int x,int y)
{
if(x==0) return y;
return gcd(y%x,x);
}
void build(int l,int r,int rt)
{
if(l==r)
{
g[rt]=s[l];
return ;
}
int mid=(l+r)/2;
build(l,mid,rt<<1); build(mid+1,r,rt<<1|1);
g[rt]=gcd(g[rt<<1],g[rt<<1|1]);
}
int query(int L,int R,int l,int r,int rt)
{
if(r<L||l>R) return 0;
if(L<=l&&r<=R)
{
return g[rt];
}
int mid=(l+r)/2;
int u=query(L,R,l,mid,rt<<1);
int v=query(L,R,mid+1,r,rt<<1|1);
return gcd(u,v);
}
int main()
{
scanf("%d",&n);
for(int i=1;i<=n;i++)
{
scanf("%d",s+i);
b[i]=(make_pair(s[i],i));
}
sort(b+1,b+1+n);
build(1,n,1);
int m;
scanf("%d",&m);
while(m--)
{
int Left,Right;
scanf("%d%d",&Left,&Right);
int G=query(Left,Right,1,n,1);
int from=lower_bound(b+1,b+n+1,make_pair(G,Left))-(b+1);
int to=lower_bound(b+1,b+1+n,make_pair(G,Right+1))-(b+1);
printf("%d\n",(Right-Left+1)-(to-from));
}
return 0;
}发布者:全栈程序员栈长,转载请注明出处:https://javaforall.cn/116374.html原文链接:https://javaforall.cn
边栏推荐
- 反诈困境,国有大行如何破局?
- 想杀死某个端口进程,但在服务列表中却找不到,可以之间通过命令行找到这个进程并杀死该进程,减少重启电脑和找到问题根源。
- 目前股票开户安全吗?可以直接网上开户吗。
- Is embedded system really safe? [how does onespin comprehensively solve the IC integrity problem for the development team]
- Cantata9.0 | 全 新 功 能
- ISO 26262 - 基于需求测试以外的考虑因素
- Don't fall behind! Simple and easy-to-use low code development to quickly build an intelligent management information system
- Is it safe to open a stock account at present? Can I open an account online directly.
- Micro service remote debug, nocalhost + rainbow micro service development second bullet
- 阿洛的烦恼
猜你喜欢

Tensorflow2.x下如何运行1.x的代码

Static analysis of software defects codesonar 5.2 release

写了个 Markdown 命令行小工具,希望能提高园友们发文的效率!
![嵌入式系统真正安全了吗?[ OneSpin如何为开发团队全面解决IC完整性问题 ]](/img/af/61b384b1b6ba46aa1a6011f8a30085.png)
嵌入式系统真正安全了吗?[ OneSpin如何为开发团队全面解决IC完整性问题 ]

AADL inspector fault tree safety analysis module

ERROR: 1064 (42000): You have an error in your SQL syntax; check the manual that corresponds to your

【C语言】指针进阶---指针你真的学懂了吗?

How to meet the dual needs of security and confidentiality of medical devices?

How to meet the dual needs of security and confidentiality of medical devices?

万字总结数据存储,三大知识点
随机推荐
Implement secondary index with Gaussian redis
开发那些事儿:Go加C.free释放内存,编译报错是什么原因?
凌云出海记 | 易点天下&华为云:推动中国电商企业品牌全球化
Apifox interface integrated management new artifact
FTP steps for downloading files from Huawei CE switches
写一下跳表
The latest version of codesonar has improved functional security and supports Misra, c++ parsing and visualization
《数字图像处理原理与实践(MATLAB版)》一书之代码Part2[通俗易懂]
写了个 Markdown 命令行小工具,希望能提高园友们发文的效率!
DataTable数据转换为实体
npm uninstall和rm直接删除的区别
字符串中数据排序
写了个 Markdown 命令行小工具,希望能提高园友们发文的效率!
2022如何评估与选择低代码开发平台?
【函数递归】简单递归的5个经典例子,你都会吗?
目前股票开户安全吗?可以直接网上开户吗。
微服务远程Debug,Nocalhost + Rainbond微服务开发第二弹
阿里云有奖体验:如何通过ECS挂载NAS文件系统
CodeSonar网络研讨会
Intelligent software analysis platform embold