当前位置:网站首页>FatMouse' Trade (Hangdian 1009)
FatMouse' Trade (Hangdian 1009)
2022-07-07 20:59:00 【Full stack programmer webmaster】
Hello everyone , I meet you again , I'm the king of the whole stack .
FatMouse’ Trade
Time Limit : 2000/1000ms (Java/Other) Memory Limit : 65536/32768K (Java/Other)
Total Submission(s) : 1 Accepted Submission(s) : 1
Font: Times New Roman | Verdana | Georgia
Font Size: ← →
Problem Description
FatMouse prepared M pounds of cat food, ready to trade with the cats guarding the warehouse containing his favorite food, JavaBean. The warehouse has N rooms. The i-th room contains J[i] pounds of JavaBeans and requires F[i] pounds of cat food. FatMouse does not have to trade for all the JavaBeans in the room, instead, he may get J[i]* a% pounds of JavaBeans if he pays F[i]* a% pounds of cat food. Here a is a real number. Now he is assigning this homework to you: tell him the maximum amount of JavaBeans he can obtain.
Input
The input consists of multiple test cases. Each test case begins with a line containing two non-negative integers M and N. Then N lines follow, each contains two non-negative integers J[i] and F[i] respectively. The last test case is followed by two -1’s. All integers are not greater than 1000.
Output
For each test case, print in a single line a real number accurate up to 3 decimal places, which is the maximum amount of JavaBeans that FatMouse can obtain.
Sample Input
5 3
7 2
4 3
5 2
20 3
25 18
24 15
15 10
-1 -1Sample Output
13.333
31.500// This is a simple greedy problem . It means that rats have m Bang cat food , By giving cat food data[i].b Be able to exchange data[i].a, Ask how much food you can exchange at most .// Just put data[i].a/data[i].b The value of can be sorted from large to small . #include<stdio.h>struct st{ double a; double b; double c;}data[1000];int main(){ int i,j,m,n; struct st data[1000],t; while(scanf("%d %d",&m,&n)&&(m!=-1||n!=-1)) { double sum=0.000; for(i=0;i<n;i++) { scanf("%lf %lf",&data[i].a,&data[i].b); } for(i=0;i<n;i++) { for( j=i+1;j<n;j++) { if((data[i].a/data[i].b)<data[j].a/data[j].b) { t=data[i]; data[i]=data[j]; data[j]=t;} } } for(i=0;i<n;i++) { if(m-data[i].b>=0.001) { sum+=data[i].a; m-=data[i].b; } else { sum=sum+m*data[i].a/data[i].b; break; } } printf("%.3lf\n",sum); } return 0;}Publisher : Full stack programmer stack length , Reprint please indicate the source :https://javaforall.cn/116298.html Link to the original text :https://javaforall.cn
边栏推荐
- I wrote a markdown command line gadget, hoping to improve the efficiency of sending documents by garden friends!
- Make this crmeb single merchant wechat mall system popular, so easy to use!
- 使用高斯Redis实现二级索引
- Optimization cases of complex factor calculation: deep imbalance, buying and selling pressure index, volatility calculation
- 恶魔奶爸 A3阶段 近常速语流初接触
- 万字总结数据存储,三大知识点
- 微服务远程Debug,Nocalhost + Rainbond微服务开发第二弹
- 恶魔奶爸 A0 英文零基础的自我提升路
- I Basic concepts
- 如何满足医疗设备对安全性和保密性的双重需求?
猜你喜欢

Small guide for rapid formation of manipulator (12): inverse kinematics analysis

上海交大最新《标签高效深度分割》研究进展综述,全面阐述无监督、粗监督、不完全监督和噪声监督的深度分割方法

Details of C language integer and floating-point data storage in memory (including details of original code, inverse code, complement, size end storage, etc.)
Mysql子查询关键字的使用方式(exists)

万字总结数据存储,三大知识点

C语言多角度帮助你深入理解指针(1. 字符指针2. 数组指针和 指针数组 、数组传参和指针传参3. 函数指针4. 函数指针数组5. 指向函数指针数组的指针6. 回调函数)

Mongodb learn from simple to deep

H3C s7000/s7500e/10500 series post stack BFD detection configuration method
Klocwork code static analysis tool

How does codesonar help UAVs find software defects?
随机推荐
Airiot helps the urban pipe gallery project, and smart IOT guards the lifeline of the city
Phoenix JDBC
机械臂速成小指南(十一):坐标系的标准命名
Lex & yacc of Pisa proxy SQL parsing
智能软件分析平台Embold
Data sorting in string
现在网上开户安全么?想知道我现在在南宁,到哪里开户比较好?
恶魔奶爸 C
如何满足医疗设备对安全性和保密性的双重需求?
Is embedded system really safe? [how does onespin comprehensively solve the IC integrity problem for the development team]
Postgresql数据库character varying和character的区别说明
Is it safe to open a stock account at present? Can I open an account online directly.
[function recursion] do you know all five classic examples of simple recursion?
201215-03-19—cocos2dx内存管理–具体解释「建议收藏」
I have to use my ID card to open an account. Is the bank card safe? I don't understand it
OneSpin | 解决IC设计中的硬件木马和安全信任问题
uva 12230 – Crossing Rivers(概率)「建议收藏」
H3C S7000/S7500E/10500系列堆叠后BFD检测配置方法
测量楼的高度
Alibaba cloud award winning experience: how to mount NAS file system through ECS