• POJ 1958


    Description

    Background
    Charlie Darkbrown sits in another one of those boring Computer Science lessons: At the moment the teacher just explains the standard Tower of Hanoi problem, which bores Charlie to death!
    这里写图片描述

    The teacher points to the blackboard (Fig. 4) and says: “So here is the problem:
    There are three towers: A, B and C.
    There are n disks. The number n is constant while working the puzzle.
    All disks are different in size.
    The disks are initially stacked on tower A increasing in size from the top to the bottom.
    The goal of the puzzle is to transfer all of the disks from tower A to tower C.
    One disk at a time can be moved from the top of a tower either to an empty tower or to a tower with a larger disk on the top.

    So your task is to write a program that calculates the smallest number of disk moves necessary to move all the disks from tower A to C.”
    Charlie: “This is incredibly boring—everybody knows that this can be solved using a simple recursion.I deny to code something as simple as this!”
    The teacher sighs: “Well, Charlie, let’s think about something for you to do: For you there is a fourth tower D. Calculate the smallest number of disk moves to move all the disks from tower A to tower D using all four towers.”
    Charlie looks irritated: “Urgh… Well, I don’t know an optimal algorithm for four towers… ”
    Problem
    So the real problem is that problem solving does not belong to the things Charlie is good at. Actually, the only thing Charlie is really good at is “sitting next to someone who can do the job”. And now guess what — exactly! It is you who is sitting next to Charlie, and he is already glaring at you.
    Luckily, you know that the following algorithm works for n <= 12: At first k >= 1 disks on tower A are fixed and the remaining n-k disks are moved from tower A to tower B using the algorithm for four towers.Then the remaining k disks from tower A are moved to tower D using the algorithm for three towers. At last the n - k disks from tower B are moved to tower D again using the algorithm for four towers (and thereby not moving any of the k disks already on tower D). Do this for all k 2 ∈{1, …. , n} and find the k with the minimal number of moves.
    So for n = 3 and k = 2 you would first move 1 (3-2) disk from tower A to tower B using the algorithm for four towers (one move). Then you would move the remaining two disks from tower A to tower D using the algorithm for three towers (three moves). And the last step would be to move the disk from tower B to tower D using again the algorithm for four towers (another move). Thus the solution for n = 3 and k = 2 is 5 moves. To be sure that this really is the best solution for n = 3 you need to check the other possible values 1 and 3 for k. (But, by the way, 5 is optimal… )
    Input

    There is no input.
    Output

    For each n (1 <= n <= 12) print a single line containing the minimum number of moves to solve the problem for four towers and n disks.
    Sample Input

    No input.
    Sample Output

    REFER TO OUTPUT.
    Source

    TUD Programming Contest 2002, Darmstadt, Germany
    .
    .
    .
    .
    .

    分析

    先在四塔情况下把i个盘子移动到B柱,再在三塔情况下把n-i个盘子移动到D柱,最后把i个盘子移到D柱。
    可以列出f[n] = min{f[i]*2+d[n-i]}
    其中f[i]是四塔数组,d[i]是三塔数组。
    .
    .
    .
    .
    .
    .

    程序:
    #include<iostream>
    #include<string.h>
    using namespace std;
    int main()
    {
        int d[15],f[15];
        d[1]=1;
        for (int i=2;i<=12;i++) 
        d[i]=2*d[i-1]+1;
        memset(f,127,sizeof(f));
        f[1]=1;
        f[2]=3;
        for (int i=1;i<=12;i++)
        {
            for (int j=1;j<i;j++)
            f[i]=min(f[i],f[j]*2+d[i-j]);
            cout<<f[i]<<endl;
        }
        return 0;
    }
  • 相关阅读:
    DDos游戏行业受攻击最多
    木马——本质就是cs socket远程控制,反弹木马是作为c端向外发起网络请求
    IPS
    C&C控制服务的设计和侦测方法综述——DDoS攻击,上传从宿主机偷窃的到的信息,定时给感染机文件加密勒索等。
    Fast Flux技术——本质就是跳板,控制多个机器,同一域名指向极多的IP(TTL修改为0),以逃避追踪
    DNS解析污染原理——要么修改包,要么直接丢弃你的网络包
    将string当字节流使
    Memcached常用命令及使用说明
    在Linux上安装Memcached服务
    安装和使用memcached
  • 原文地址:https://www.cnblogs.com/YYC-0304/p/9499912.html
Copyright © 2020-2023  润新知