poj-1104 Robbery
| Time Limit: 1000MS | Memory Limit: 32768K | |
| Total Submissions: 1249 | Accepted: 504 |
Description
But this time, he has had enough! Inspector Robstop decides to
analyze how the robber could have escaped. To do that, he asks you to
write a program which takes all the information the inspector could get
about the robber in order to find out where the robber has been at which
time.
Coincidentally, the city in which the bank was robbed has a
rectangular shape. The roads leaving the city are blocked for a certain
period of time t, and during that time, several observations of the form
"The robber isn't in the rectangle Ri at time ti" are reported.
Assuming that the robber can move at most one unit per time step, your
program must try to find the exact position of the robber at each time
step.
Input
input contains the description of several robberies. The first line of
each description consists of three numbers W, H, t (1 <= W,H,t <=
100) where W is the width, H the height of the city and t is the time
during which the city is locked.
The next contains a single integer n (0 <= n <= 100), the
number of messages the inspector received. The next n lines (one for
each of the messages) consist of five integers ti, Li, Ti, Ri, Bi each.
The integer ti is the time at which the observation has been made (1
<= ti <= t), and Li, Ti, Ri, Bi are the left, top, right and
bottom respectively of the (rectangular) area which has been observed.
(1 <= Li <= Ri <= W, 1 <= Ti <= Bi <= H; the point (1,
1) is the upper left hand corner, and (W, H) is the lower right hand
corner of the city.) The messages mean that the robber was not in the
given rectangle at time ti.
The input is terminated by a test case starting with W = H = t = 0. This case should not be processed.
Output
each robbery, first output the line "Robbery #k:", where k is the
number of the robbery. Then, there are three possibilities:
If it is impossible that the robber is still in the city considering the messages, output the line "The robber has escaped."
In all other cases, assume that the robber really is in the city.
Output one line of the form "Time step : The robber has been at x,y."
for each time step, in which the exact location can be deduced. (x and y
are the column resp. row of the robber in time step .) Output these
lines ordered by time .
If nothing can be deduced, output the line "Nothing known." and hope that the inspector will not get even more angry.
Output a blank line after each processed case.
Sample Input
4 4 5
4
1 1 1 4 3
1 1 1 3 4
4 1 1 3 4
4 4 2 4 4
10 10 3
1
2 1 1 10 10
0 0 0
Sample Output
Robbery #1:
Time step 1: The robber has been at 4,4.
Time step 2: The robber has been at 4,3.
Time step 3: The robber has been at 4,2.
Time step 4: The robber has been at 4,1. Robbery #2:
The robber has escaped.
Source
OJ-ID:
poj-1104
author:
Caution_X
date of submission:
20191024
tags:
模拟
description modelling:
给定一个矩形,现在给定四个点构成一个扫描矩形(扫描矩形在矩形内),表示该扫描矩形范围内没有盗贼,现在给出N个这样的扫描矩形,每个扫描矩形都有对应的时间,表示该扫描发生的时间,现在问能否通过N次扫描判断盗贼的状态(已逃离(离开给定的坐标范围),不确定,或者确定在点(x,y))
major steps to solve it:
vis[t][r][c]=1表示t时刻(r,c)处有盗贼
(1)按照时间正向反向搜索两次,每次扫描的目的在于判断vis[t][r][c]为0的点应不应该是1(因为扫描矩形范围内是1不代表扫描矩形外一定是0,有一些点虽然在扫描矩形外,但它依然必须是1)
(2)完成两次扫描之后遍历时间1~T状态下矩形的点,如果存在某个状态全为1,说明盗贼已经离开了矩形(已逃离),如果某个状态整个矩形只有一点是0,说明该状态下盗贼就在该点。如果所有时间的矩形都扫描过了而且没有得到盗贼的状态,输出不确定时的答案。
正向搜索方式:如果t时刻在(r,c)即vis[t][r][c]=0,那么t-1时刻必然在(r,c)周围(含(r,c))的5个点内,如果这5个点都是1,那么实际上vis[t][r][c]=1。反向搜索类似。
AC code:
#include<cstdio>
#include<cstring>
#include<algorithm>
using namespace std;
int vis[][][];//vis[t][r][c]=1表示第t时刻r行c列没有盗贼
int dir[][]={{,},{,},{,},{,-},{-,}};
int res[][]; //res[i][]表示第i时刻可能的位置
int W,H,T;
bool inrange(int r,int c)
{
return (r>=&&r<=H&&c>=&&c<=W);
}
void change(int r,int c,int t,int pre_t)
{
if(vis[t][r][c]) return;
for(int d=;d<;d++) {
int tmp_r=r+dir[d][];
int tmp_c=c+dir[d][];
if(inrange(tmp_r,tmp_c)&&!vis[pre_t][tmp_r][tmp_c]) return;
}
vis[t][r][c]=;
return;
}
int main()
{
//freopen("input.txt","r",stdin);
int kase=;
while(~scanf("%d%d%d",&W,&H,&T)&&W&&H&&T) {
printf("Robbery #%d:\n",kase++);
memset(vis,,sizeof(vis));
int N;
scanf("%d",&N);
while(N--) {
int Li,Ri,Ti,Bi,t;
scanf("%d%d%d%d%d",&t,&Li,&Ti,&Ri,&Bi);
for(int i=Ti;i<=Bi;i++) {
for(int j=Li;j<=Ri;j++) {
vis[t][i][j]=;
}
}
}
for(int d=;d<;d++) {
for(int i=;i<=T;i++) {
for(int r=;r<=H;r++) {
for(int c=;c<=W;c++) {
if(d==&&i!=) change(r,c,i,i-);
else change(r,c,T-i+,T-i+);
}
}
}
}
int escaped=,unknown=;
memset(res,-,sizeof(res));
for(int i=;i<=T;i++) {
bool is_allone=true;
bool is_twice_one=false;
for(int r=;r<=H;r++) {
for(int c=;c<=W;c++) {
if(!vis[i][r][c]) {
is_allone=false;
if(res[i][]==-) {
res[i][]=r;
res[i][]=c;
}
else if(res[i][]>=) {
res[i][]=-;
is_twice_one=true;
break;
}
}
}
if(is_twice_one) break;
}
if(!is_allone) escaped=;
if(res[i][]>=) unknown=;
}
if(escaped) printf("The robber has escaped.\n");
else if(unknown) printf("Nothing known.\n");
else {
for(int i=;i<=T;i++) {
if(res[i][]>=) {
printf("Time step %d: The robber has been at %d,%d.\n",i,res[i][],res[i][]);
}
}
}
printf("\n");
}
return ;
}
poj-1104 Robbery的更多相关文章
- POJ 3900 The Robbery
大意:和背包的问题相似,第 i 个箱子有 i 颗钻石.钻石的重量,价值给出.然后再M的重量下背尽量多价值的钻石. 思路:直接暴搜然后剪枝.因为数据范围的原因无法用DP. #include <cs ...
- POJ题目细究
acm之pku题目分类 对ACM有兴趣的同学们可以看看 DP: 1011 NTA 简单题 1013 Great Equipment 简单题 102 ...
- 【转】POJ百道水题列表
以下是poj百道水题,新手可以考虑从这里刷起 搜索1002 Fire Net1004 Anagrams by Stack1005 Jugs1008 Gnome Tetravex1091 Knight ...
- POJ题目排序的Java程序
POJ 排序的思想就是根据选取范围的题目的totalSubmittedNumber和totalAcceptedNumber计算一个avgAcceptRate. 每一道题都有一个value,value ...
- 搜索+剪枝 POJ 1416 Shredding Company
POJ 1416 Shredding Company Time Limit: 1000MS Memory Limit: 10000K Total Submissions: 5231 Accep ...
- OpenJudge 2803 碎纸机 / Poj 1416 Shredding Company
1.链接地址: http://poj.org/problem?id=1416 http://bailian.openjudge.cn/practice/2803 2.题目: 总时间限制: 1000ms ...
- [POJ] 1511 Invitation Cards
Invitation Cards Time Limit: 8000MS Memory Limit: 262144K Total Submissions: 18198 Accepted: 596 ...
- POJ 1511 Invitation Cards / UVA 721 Invitation Cards / SPOJ Invitation / UVAlive Invitation Cards / SCU 1132 Invitation Cards / ZOJ 2008 Invitation Cards / HDU 1535 (图论,最短路径)
POJ 1511 Invitation Cards / UVA 721 Invitation Cards / SPOJ Invitation / UVAlive Invitation Cards / ...
- POJ 1416 Shredding Company【dfs入门】
题目传送门:http://poj.org/problem?id=1416 Shredding Company Time Limit: 1000MS Memory Limit: 10000K Tot ...
- POJ 1511 Invitation Cards(单源最短路,优先队列优化的Dijkstra)
Invitation Cards Time Limit: 8000MS Memory Limit: 262144K Total Submissions: 16178 Accepted: 526 ...
随机推荐
- Netty — 线程模型
一.前言 众所周知,netty是高性能的原因源于其使用的是NIO,但是这只是其中一方面原因,其IO模型上决定的.另一方面源于其线程模型的设计,良好的线程模型设计,能够减少线程上下文切换,减少甚至避免锁 ...
- .deb文件安装应该怎么做
https://unix.stackexchange.com/questions/159094/how-to-install-a-deb-file-by-dpkg-i-or-by-apt
- SQL常用函数之STR()
使用str函数 :STR 函数由数字数据转换来的字符数据. 语法 STR ( float_expression [ , length [ , ...
- 通过对象方法获取委托_C#反射获取委托_
前言:时间紧,先写关键代码,以后优化: 在此感谢其他博友分享的文章,参考文章:C#反射委托创建器 1-定义含有委托的类: public class TimeCycle { /// <summar ...
- 高强度学习训练第十一天总结:Class文件结构(二)
常量池 可以理解为Class文件之中的资源仓库,他是Class文件结构中与其他项目关联最多的数据类型,也是占用Class文件空间最大的数据项目之一 访问标志 在常量池结束后,紧接着的俩个字节代表访问标 ...
- 复习一下KVC
一. 前言 KVC(Key Value Coding)是Cocoa框架为开发者提供的非常强大的工具,简单解释为:键值编码.它依赖于Runtime,在OC的动态性方面发挥了重要作用. 它主要的功能在于直 ...
- 网络爬虫之使用pyppeteer替代selenium完美绕过webdriver检测
1引言 曾经使用模拟浏览器操作(selenium + webdriver)来写爬虫,但是稍微有点反爬的网站都会对selenium和webdriver进行识别,网站只需要在前端js添加一下判断脚本,很容 ...
- 让Windows的文件名区分大小写
背景 最近在Linux官网下载了Linux内核,下载下来的是一个后缀为.tar.xz的压缩包,于是在毫不知情的情况下随随便便解压了,解压过程中出现了很多问题. 其中一个问题就是在Windows下,不区 ...
- Centos7 环境安装初始化
安装系统 默认分区 磁盘分配(以20G为例): Boot分区:引导分区系统启动的必要核心文件,建议1G Var分区:存放log文件,不分则在/下,建议1G Home分区:存放用户数据,一般都比较大,建 ...
- Html学习之十(CSS选择器的使用--伪类选择器)
伪类选择器 一.基于a标签. 1.:hover 选择鼠标滑过的超链接元素 2.:active 选择鼠标单击中的超链接元素 3.:link 选择未被访问的超链接元素 4.:visited 选择已经被访问 ...