Protecting the Flowers

本文介绍了一个关于牛群运输调度的问题,通过贪心算法实现最优调度,以最小化花被破坏的数量。该算法首先对每头牛的破坏速度与其所需运输时间的比例进行排序,然后依次运输以达到最小化总损失的目标。

摘要生成于 C知道 ,由 DeepSeek-R1 满血版支持, 前往体验 >

H - Protecting the Flowers
Time Limit:2000MS     Memory Limit:65536KB     64bit IO Format:%I64d & %I64u
Appoint description:  

Description

Farmer John went to cut some wood and left N (2 ≤ N ≤ 100,000) cows eating the grass, as usual. When he returned, he found to his horror that the cluster of cows was in his garden eating his beautiful flowers. Wanting to minimize the subsequent damage, FJ decided to take immediate action and transport each cow back to its own barn.

Each cow i is at a location that is Ti minutes (1 ≤ Ti ≤ 2,000,000) away from its own barn. Furthermore, while waiting for transport, she destroysDi (1 ≤ Di ≤ 100) flowers per minute. No matter how hard he tries, FJ can only transport one cow at a time back to her barn. Moving cow i to its barn requires 2 × Ti minutes (Ti to get there and Ti to return). FJ starts at the flower patch, transports the cow to its barn, and then walks back to the flowers, taking no extra time to get to the next cow that needs transport.

Write a program to determine the order in which FJ should pick up the cows so that the total number of flowers destroyed is minimized.

Input

Line 1: A single integer   N
Lines 2..   N+1: Each line contains two space-separated integers,   Ti  and   Di, that describe a single cow's characteristics

Output

Line 1: A single integer that is the minimum number of destroyed flowers

Sample Input

6
3 1
2 5
2 3
3 2
4 1
1 6

Sample Output

86

Hint

FJ returns the cows in the following order: 6, 2, 3, 4, 1, 5. While he is transporting cow 6 to the barn, the others destroy 24 flowers; next he will take cow 2, losing 28 more of his beautiful flora. For the cows 3, 4, 1 he loses 16, 12, and 6 flowers respectively. When he picks cow 5 there are no more cows damaging the flowers, so the loss for that cow is zero. The total flowers lost this way is 24 + 28 + 16 + 12 + 6 = 86.

 

每头牛对应需要赶回的时间和吃草速度,求吃最少的草。

一个贪心的题,按速度除以时间排序;证明:取两头牛,其他的牛吃的草就可以看成常量,若先赶a牛,吃的草是2*t[a]*d[b],若是b牛,就是2*t[b]*d[a],就是比较这两个的大小。这样看就是一个水题了。

 

#include
#include
using namespace std;
struct Cow{
 long long t;
 long long d;
}cow[100005];
bool cmp(const Cow &a, const Cow &b)
{
 return a.d * b.t > b.d * a.t;
}
int main()
{
 ios::sync_with_stdio(false);
 long long m, n, i, j, sum, ans;
 cin >> n;
 sum = 0; ans = 0;
 for (i = 1; i <= n; i++)
 {
  cin >> cow[i].t >> cow[i].d;
 }
 for (i = 1; i <= n; i++)
  sum += cow[i].d;
 sort(cow + 1, cow + n+1 , cmp);
 for (i = 1; i <= n; i++)
 {
  sum -= cow[i].d;
  ans += sum * 2 * cow[i].t;
 }
 
 cout << ans << '\n';
 return 0;
}

### CTF Competition 'Great Wall' Challenge Overview CTF (Capture The Flag) competitions often feature challenges with unique names, such as the 'Great Wall'. While there is no direct mention of a specific 'Great Wall' challenge in the provided references, it is common for CTF events to include problems that test participants' skills in areas like web exploitation, reverse engineering, cryptography, and more. In similar contexts, some challenges might involve bypassing filters or exploiting vulnerabilities within applications. For instance, one reference discusses SQL injection techniques where filtering mechanisms can be circumvented by manipulating input encodings[^5]. This approach could potentially apply to a hypothetical 'Great Wall' scenario if the problem involves overcoming robust security measures designed to block unauthorized access. Additionally, another example highlights how writing detailed solutions after completing tasks helps reinforce learning outcomes from participating in these contests[^1]. Such documentation not only aids personal growth but also contributes valuable insights back into the community through shared writeups. For an actual 'Great Wall'-themed task at any given event, contestants may encounter puzzles requiring them to analyze code implementations closely—like identifying flaws tied to CVE identifiers—as seen here regarding vulnerability exploits related specifically towards Java deserialization attacks linked under certain conditions against Apache Log4j versions prior up until early 2022 releases[^3]. Moreover, modern-day training exercises sometimes incorporate real-world scenarios including mobile operating systems development processes which were briefly touched upon concerning Harmony OS packaging procedures during interviews alongside other miscellaneous flags captured via various methods outlined previously too[^4]. Thus, when approaching this type of themed question set labeled “The Great Wall,” expect multi-layered obstacles demanding comprehensive knowledge across multiple domains coupled together seamlessly throughout each stage progression path leading ultimately toward uncovering hidden secrets buried deep inside layers metaphorically representing ancient fortifications themselves standing tall protecting kingdoms long ago just awaiting brave warriors ready conquer all adversities ahead fearlessly moving forward ever closer victory! ```python # Example Python Code Demonstrating Basic String Manipulation That Could Be Relevant In A Hypothetical Scenario Related To Overcoming Filters Or Decoding Messages Within Challenges Like These. def decode_message(encoded_string): decoded_chars = [] i = 0 while i < len(encoded_string): if encoded_string[i] == '%' and i + 2 < len(encoded_string): hex_value = encoded_string[i+1:i+3] try: char_code = int(hex_value, 16) decoded_char = chr(char_code) decoded_chars.append(decoded_char) i += 3 except ValueError: decoded_chars.append('%') i += 1 elif encoded_string[i] == '\\' and i + 1 < len(encoded_string): next_char = encoded_string[i+1] escaped_char = { 'n': '\n', 't': '\t', '"': '\"', "'": "\'", '\\':'\\' }.get(next_char,next_char) decoded_chars.append(escaped_char) i+=2 else: decoded_chars.append(encoded_string[i]) i+=1 return ''.join(decoded_chars) example_input="%df%5c'" output=decode_message(example_input) print(f"The original string '{example_input}' decodes to '{output}'.") ```
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值