21094_MorseCode

2022-5-16 18:18| 发布者: Hocassian| 查看: 45| 评论: 0|原作者: 肇庆学院ACM合集

摘要:
C:\Users\Administrator\Downloads\2019-10-12-10-14-3-89504831256400-Problem List-采集的数据-后羿采集器.html

Pro.ID

21094

Title

Morse Code

Title链接

http://10.20.2.8/oj/exercise/problem?problem_id=21094

AC

32

Submit

46

Ratio

69.57%

时间&空间限制

  • Time Limit: 600/200 MS (Java/Others)     Memory Limit: 20000/10000 K (Java/Others)
  • 描述

    Morse code represents characters as variable length sequences of dots and dashes. In practice, characters in a message are delimited by short pauses. The following table shows the Morse code sequences: 

    A .- H .... O --- V ...-
    B -... I .. P .--. W .--
    C -.-. J .--- Q --.- X -..-
    D -.. K -.- R .-. Y -.--
    E . L .-.. S ... Z --..
    F ..-. M -- T -    
    G --. N -. U ..-  

    Note that four dot-dash combinations are unassigned. For the purposes of this problem we will assign them as follows (these are not the assignments for actual Morse code): 

    underscore ..-- period ---.
    comma .-.- question mark ----

    Thus, the message "ACM_GREATER_NY_REGION" is encoded as:
    .- -.-. -- ..-- --. .-. . .- - . .-. ..-- -. -.-- ..-- .-. . --. .. --- -.
    M.E. Ohaver proposed an encryption scheme based on mutilating Morse code. Her scheme replaces the pauses between letters, necessary because Morse is a variable-length encoding that is not prefix-free, with a string that identifies the number of dots and dashes in each. For example, consider the message ".--.-.--". Without knowing where the pauses should be, this could be "ACM", "ANK", or several other possibilities. If we add length information, however, ".--.-.--242", then the code is unabiguous.
    Ohaver's scheme has three steps, the same for encryption and decryption:
    1. Convert the text to Morse code without pauses but with a string of numbers to indicate code lengths
    2. Reverse the string of numbers
    3. Convert the dots and dashes back into to text using the reversed string of numbers as code lengths
    As an example, consider the encrypted message "AKADTOF_IBOETATUK_IJN". Converting to Morse code with a length string yields ".--.-.--..----..-...--..-...---.-.--..--.-..--...----.232313442431121334242". Reversing the numbers and decoding yields the original message "ACM_GREATER_NY_REGION".

    输入

    This problem requires that you implement Ohaver's encoding algorithm. The input will consist of several messages encoded with Ohaver's algorithm. The first line of the input is an integer n that specifies the number of test cases. The following n lines contain one message per line. Each message will use only the twenty-six capital letters, underscores, commas, periods, and question marks. Messages will not exceed 100 characters in length.

    输出

    Description

    Morse code represents characters as variable length sequences of dots and dashes. In practice, characters in a message are delimited by short pauses. The following table shows the Morse code sequences: 

    A .- H .... O --- V ...-
    B -... I .. P .--. W .--
    C -.-. J .--- Q --.- X -..-
    D -.. K -.- R .-. Y -.--
    E . L .-.. S ... Z --..
    F ..-. M -- T -    
    G --. N -. U ..-  

    Note that four dot-dash combinations are unassigned. For the purposes of this problem we will assign them as follows (these are not the assignments for actual Morse code): 

    underscore ..-- period ---.
    comma .-.- question mark ----

    Thus, the message "ACM_GREATER_NY_REGION" is encoded as:
    .- -.-. -- ..-- --. .-. . .- - . .-. ..-- -. -.-- ..-- .-. . --. .. --- -.
    M.E. Ohaver proposed an encryption scheme based on mutilating Morse code. Her scheme replaces the pauses between letters, necessary because Morse is a variable-length encoding that is not prefix-free, with a string that identifies the number of dots and dashes in each. For example, consider the message ".--.-.--". Without knowing where the pauses should be, this could be "ACM", "ANK", or several other possibilities. If we add length information, however, ".--.-.--242", then the code is unabiguous.
    Ohaver's scheme has three steps, the same for encryption and decryption:
    1. Convert the text to Morse code without pauses but with a string of numbers to indicate code lengths
    2. Reverse the string of numbers
    3. Convert the dots and dashes back into to text using the reversed string of numbers as code lengths
    As an example, consider the encrypted message "AKADTOF_IBOETATUK_IJN". Converting to Morse code with a length string yields ".--.-.--..----..-...--..-...---.-.--..--.-..--...----.232313442431121334242". Reversing the numbers and decoding yields the original message "ACM_GREATER_NY_REGION".

    Input
    This problem requires that you implement Ohaver's encoding algorithm. The input will consist of several messages encoded with Ohaver's algorithm. The first line of the input is an integer n that specifies the number of test cases. The following n lines contain one message per line. Each message will use only the twenty-six capital letters, underscores, commas, periods, and question marks. Messages will not exceed 100 characters in length.
    Output
    For each message in the input, output the line number starting in column one, a colon, a space, and then the decoded message. The output format must be adhered to precisely.
    Sample Input
    5
    AKADTOF_IBOETATUK_IJN
    PUEL
    QEWOISE.EIVCAEFNRXTBELYTGD.
    ?EJHUT.TSMYGW?EJHOT
    DSU.XFNCJEVE.OE_UJDXNO_YHU?VIDWDHPDJIKXZT?E
    Sample Output
    1: ACM_GREATER_NY_REGION
    2: PERL
    3: QUOTH_THE_RAVEN,_NEVERMORE.
    4: TO_BE_OR_NOT_TO_BE?
    5: THE_QUICK_BROWN_FOX_JUMPS_OVER_THE_LAZY_DOG
    Source

    样例输入

    5
    AKADTOF_IBOETATUK_IJN
    PUEL
    QEWOISE.EIVCAEFNRXTBELYTGD.
    ?EJHUT.TSMYGW?EJHOT
    DSU.XFNCJEVE.OE_UJDXNO_YHU?VIDWDHPDJIKXZT?E

    样例输出

    1: ACM_GREATER_NY_REGION
    2: PERL
    3: QUOTH_THE_RAVEN,_NEVERMORE.
    4: TO_BE_OR_NOT_TO_BE?
    5: THE_QUICK_BROWN_FOX_JUMPS_OVER_THE_LAZY_DOG

    作者


    路过

    雷人

    握手

    鲜花

    鸡蛋

    最新评论

    返回顶部