1020. Mooncake (25) time limit of MS memory limit 65536 KB code length limit 8000 B procedure StandardAuthor Chen, YueMooncakes are a traditional food eaten by Chinese in the Mid-Autumn Festival, and there are many different flavors of mooncakes in different regions. Now given the stock of all kinds of mooncakes, the total price, as well as the market's maximum demand, please calculate what the maximum benefit you can get.Note: A portion of the invent
1015. Morality theory (25) time limit MS Memory limit 65536 KB code length limit 8000 B procedure StandardAuthor Chen, LiThe Song Dynasty historian Sima Guang in "the Capital Governance Tong Jian" has a famous "The Moral Only Theory": "is therefore only then the virtuous all says the sage, only then the German and the death is the Fool, the German wins only then is said the gentleman, only then wins the moral to be the villain. Whoever takes the techn
1005. Continuation (3n+1) conjecture (25) time limit MS Memory limit 65536 KB code length limit 8000 BKaraz (Callatz) conjecture has been given a description in 1001. In this subject, the situation is slightly more complicated.When we verify Karaz conjecture, in order to avoid repetition, we can record each number that is encountered in the recursive process. For example, when validating the n=3, we need to calculate 3, 5, 8, 4, 2, 1, then when we ver
Wannafly Challenge 25 Travel A-factor topic:Make \ (x=n! ( N\LE10^{12}), given a positive integer greater than \ (1\) \ ( p (p\le10000) \) asks for a \ (k\) to make \ (p^k|x\) and \ (p^{k+1}\not|x\) factor.Ideas:Enumeration \ (p\) of each quality factor \ (q\), find it in \ (n!\) occurrences ( /p\) occurrences, take \ (\min\) can. For a mass factor \ (q\), the number of occurrences in \ (n!\) equals \ (\sum_{i=1}^{\inf}\frac n{q^i}\).Source:#includeB-
1059. Prime factors (25) time limit MS Memory limit 65536 KB code length limit 16000 B award Program StandardAuthor He, qinmingGiven any positive an integer n, you is supposed to find all of the It prime factors, and write them in the format N = P1^K1 * P2^k2 *...*pm^km.Input Specification:Each input file contains one test case which gives a positive an integer N in the range of long Int.Output Specification:Factor N in the format n = p1^k1 * p2^k2 *.
Consultant of soft examination Information System, March 25, 2016 operationFirst, progress control1. What are the four steps of the progress control?A: Progress control can be divided into four steps: Plan, execute (DO), check, and action(Action), referred to as PDCA.2. What is the purpose of the schedule preparation? Which is the most important?A: The main purpose of the schedule preparation(1) To ensure timely profit to compensate for the expenses i
1021. Deepest Root (25)Time limitMsMemory limit65536 KBCode Length Limitations16000 BProcedures for the award of questionsStandardAuthorCHEN, YueA graph which is connected and acyclic can be considered a tree. The height of the tree depends on the selected root. Now is supposed to find the root of the results in a highest tree. Such A root is called the deepest root.Input Specification:Each input file contains the one test case. The first line contain
1094. The largest Generation (25)Time limitMsMemory limit65536 KBCode Length Limitations16000 BProcedures for the award of questionsStandardAuthorCHEN, YueA family hierarchy is usually presented by a pedigree tree where all the nodes on the same level belong to the same genera tion. Your task is to find the generation with the largest population.Input Specification:Each input file contains the one test case. Each case starts with a positive integers N
Test instructions: There are 50 25 10 5 1 coins with a total of up to 100 inputs n output How many representations are there?Sample Input1126Sample Output4131# include 2# include 3# include 4# include 5# include string>6# include 7# include 8# include 9# define LLLong LongTen using namespacestd; One A intc1[ -][ the],c2[ -][ the]; - intans[ -] ; - intw[6]={0,1,5,Ten, -, -}; the - voidInit () { -memset (C1,0,sizeof(C1)); -memset (C2,0,sizeof(C2)); +c
1033. To-fill or not-to-fill (25) time limit of ten MS memory limit 65536 KB code length limit 16000 B procedure StandardAuthor Zhang, GuochuanWith highways available, driving a car from Hangzhou to any other city are easy. But since the tank capacity of a car was limited, we have to find gas stations on the the-on-the-the-the-time. Different give Different price. You is asked to carefully design the cheapest route to go.Input Specification:Each input
New age-y in spots). It's a good book.Completely subversion money author Dave RamseyRamsey is a fanatic of credit opposition (originally Anti-credit). About 25 years old, personal assets reached $4 million, then went bankrupt. He now runs his own financial empire. This book describes in detail the "debt snowball" model. His support for this model has led him to a lot of criticism, but his approach is effective. If you are struggling with debt, there
1002. A+b for polynomials (25) time limit MS Memory limit 65536 KB code length limit 16000 B procedure StandardAuthor Chen, YueThis is supposed to find a+b where A and B are both polynomials.InputEach input file contains the one test case. Each case occupies 2 lines, and all line contains the information of a polynomial:k N1 aN1 N2 aN2 ... NK ANK, where K is the number of nonzero terms in the polynomial, Ni and ANi (I=1, 2, ..., K) are the exponents a
1085. Perfect Sequence (25) time limit MS Memory limit 65536 KB code length limit 16000 B procedure StandardAuthor Cao, PengGiven a sequence of positive integers and another positive integer p. The sequence is said to being a "perfect sequence" if M Now given a sequence and a parameter p, you is supposed to find from the sequence as many numbers as possible to form a P Erfect subsequence.Input Specification:Each input file contains the one test case.
1079. Total Sales of supply Chain (25) time limit of MS memory limit 65536 KB code length limit 16000 B procedure StandardAuthor Chen, YueA supply chain is a network of retailers (retailer), distributors (dealer), and suppliers (supplier)--everyone involved in moving a produ CT from supplier to customer.Starting from one root supplier, everyone on the chain buys products from one's supplier in a price P and sell or Distribu Te them in a price, is r% h
1078. Hashing (25)The task of this problem are simple:insert a sequence of distinct positive integers into a hash table, and output the Posi tions of the input numbers. The hash function is defined to being "H (key) = key% tsize" where tsize is the maximum size of the hash table. Quadratic probing (with positive increments only) are used to solve the collisions.Note The table size is better to being prime. If the maximum size given by the user are not
1044. Shopping in Mars (25) time limit MS Memory limit 65536 KB code length limit 16000 B award Program StandardAuthor Chen, YueShopping in Mars is quite a different experience. The Mars people pay by chained diamonds. Each diamond have a value (in Mars dollars m$). When making the payment, the chain can is cut at any position for only once and some of the diamonds is taken off the CHA In one by one. Once a diamond is off the chain, it cannot was take
1040. Longest symmetric String (25) time limit of MS memory limit 65536 KB code length limit 16000 B procedure StandardAuthor Chen, YueGiven A string, you is supposed to output the length of the longest symmetric sub-string. For example, given ' is pattap symmetric? ', the longest symmetric sub-string is ' s pattap s ', hence you must OUTP UT 11.Input Specification:Each input file contains one test case which gives a non-empty string of length No. mor
04-Tree 5. File Transfer (25) time limit MS Memory limit 65536 KB code length limit 8000 B Program StandardAuthor Chen, YueWe have a network of computers and a list of bi-directional connections. Each of the these connections allows a file transfer from one computer to another. Is it possible to send a file from any computer on the network to any other?Input Specification:Each input file contains the one test case. For each test case, the first line c
04-Tree 5. File Transfer (25) time limit MSMemory Limit 65536 KBCode length limit 8000 BProcedures for the award of questions StandardAuthor Chen, YueWe have a network of computers and a list of bi-directional connections. Each of the these connections allows a file transfer from one computer to another. Is it possible to send a file from any computer on the network to any other?Input Specification:Each input file contains the one test case. For each
25 Java machine learning tools and libraries
It industry more and more fire, with more new troops to join the IT family, the proportion of Java is also more and more large, the following for everyone to organize a number of learning tools.
1. Weka integrates a machine learning algorithm for data mining work. These algorithms can be applied directly to a dataset or you can write your own code to invoke it. Weka includes a range of tools, such as data p
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.