当前位置:网站首页>POJ-2499 Binary Tree
POJ-2499 Binary Tree
2022-07-05 12:12:00 【全栈程序员站长】
Binary Tree
Time Limit: 1000MS | Memory Limit: 65536K | |
---|---|---|
Total Submissions: 5211 | Accepted: 2420 |
Description
Background Binary trees are a common data structure in computer science. In this problem we will look at an infinite binary tree where the nodes contain a pair of integers. The tree is constructed like this:
- The root contains the pair (1, 1).
- If a node contains (a, b) then its left child contains (a + b, b) and its right child (a, a + b)
Problem Given the contents (a, b) of some node of the binary tree described above, suppose you are walking from the root of the tree to the given node along the shortest possible path. Can you find out how often you have to go to a left child and how often to a right child?
Input
The first line contains the number of scenarios. Every scenario consists of a single line containing two integers i and j (1 <= i, j <= 2*10 9) that represent a node (i, j). You can assume that this is a valid node in the binary tree described above.
Output
The output for every scenario begins with a line containing “Scenario #i:”, where i is the number of the scenario starting at 1. Then print a single line containing two numbers l and r separated by a single space, where l is how often you have to go left and r is how often you have to go right when traversing the tree from the root to the node given in the input. Print an empty line after every scenario.
Sample Input
3
42 1
3 4
17 73
Sample Output
Scenario #1:
41 0
Scenario #2:
2 1
Scenario #3:
4 6
1 /*
2 题意:根(a,b),则左孩子为(a+b,b),右孩子为(a,a+b)
3 给定(m,n),初试根为(1,1),从(1,1)到(m,n)需要往左子树走几次,
4 往右子树走几次。
5 思路:逆向思维,从(m,n)到(1,1)。
6 给定(m,n),求其父亲,如果m>n,则他父亲是(m-n,n),
7 否则(m,n-m)。
8 代码一: ----TLE
9 #include <iostream>
10
11 using namespace std;
12
13 int main()
14 {
15 int T, a, b, lcnt, rcnt;
16 cin >> T;
17 for(int i = 1; i <= T; ++i)
18 {
19 cin >> a >> b;
20 lcnt = rcnt = 0;
21 while(a != 1 || b != 1)
22 {
23 if(a >= b)
24 {
25 ++lcnt;
26 a -= b;
27 }
28 else
29 {
30 ++rcnt;
31 b -= a;
32 }
33 }
34 cout << "Scenario #" << i << ':' << endl;
35 cout << lcnt << ' ' << rcnt << endl <<endl;
36 }
37 return 0;
38 }
39
40 代码二:
41 用除法代替减法,得到的商即为往左走的次数,最后的m=m%n。
42 n>m时情况类推。
43 需要特别注意的是:
44 如果m>n,m%n == 0 怎么办?因为根(1,1)不可能有0存在,所以特殊处理一下:
45 次数:m/n-1;m=1
46 */
47 #include <iostream>
48
49 using namespace std;
50
51 int main()
52 {
53 int T, a, b, lcnt, rcnt;
54 cin >> T;
55 for(int i = 1; i <= T; ++i)
56 {
57 cin >> a >> b;
58 lcnt = rcnt = 0;
59 while(a != 1 || b != 1)
60 {
61 if(a >= b)
62 {
63 if(a % b)
64 {
65 lcnt += a/b;
66 a %= b;
67 }
68 else
69 {
70 lcnt += a/b-1;
71 a = 1;
72 }
73 }
74 else
75 {
76 if(b % a)
77 {
78 rcnt += b/a;
79 b %= a;
80 }
81 else
82 {
83 rcnt += b/a-1;
84 b = 1;
85 }
86 }
87 }
88 cout << "Scenario #" << i << ':' << endl;
89 cout << lcnt << ' ' << rcnt << endl <<endl;
90 }
91 return 0;
92 }
发布者:全栈程序员栈长,转载请注明出处:https://javaforall.cn/110203.html原文链接:https://javaforall.cn
边栏推荐
- 调查显示传统数据安全工具在60%情况下无法抵御勒索软件攻击
- mmclassification 训练自定义数据
- redis 集群模式原理
- 【TFLite, ONNX, CoreML, TensorRT Export】
- The survey shows that traditional data security tools cannot resist blackmail software attacks in 60% of cases
- 查看rancher中debug端口信息,并做IDEA Remote Jvm Debug
- Redis集群(主从)脑裂及解决方案
- 1. Laravel creation project of PHP
- [loss functions of L1, L2 and smooth L1]
- 【PyTorch预训练模型修改、增删特定层】
猜你喜欢
随机推荐
JS for loop number exception
【pytorch 修改预训练模型:实测加载预训练模型与模型随机初始化差别不大】
嵌入式软件架构设计-消息交互
你做自动化测试为什么总是失败?
iTOP-3568开发板NPU使用安装RKNN Toolkit Lite2
Codeforces Round #804 (Div. 2)
Wireless WiFi learning 8-channel transmitting remote control module
7月华清学习-1
1. Laravel creation project of PHP
Programmers are involved and maintain industry competitiveness
【load dataset】
【Win11 多用户同时登录远程桌面配置方法】
Yolov5 target detection neural network -- calculation principle of loss function
redis主从模式
What is digital existence? Digital transformation starts with digital existence
codeforces每日5题(均1700)-第五天
Linux Installation and deployment lamp (apache+mysql+php)
MVVM framework part I lifecycle
leetcode:1200. Minimum absolute difference
The survey shows that traditional data security tools cannot resist blackmail software attacks in 60% of cases