2017.1.16【初中部 】普及组模拟赛C组 cirs 题解

原题:

http://172.16.0.132/junior/#contest/show/1366/2

题目描述:

Czyzoiers都想知道小x为什么对鸡蛋饼情有独钟。经过一番逼问,小x道出了实情:因为他喜欢圆。最近小x又发现了一个关于圆的有趣的问题:在圆上有2N个不同的点,小x想用N条线段把这些点连接起来(每个点只能连一条线段),使所有的线段都不想交,他想知道这样的连接方案有多少种?

输入:

有且仅有一个正整数N。

输出:

要求的方案数(结果mod 100000007)。

样例输入:

样例输入1:
2

样例输入2:
3

样例输入3:
24

样例输出:

样例输出1:
2

样例输出2:
5

样例输出3:
4057031

数据范围限制:

对于30%的数据:N<=5。
对于60%的数据:N<=10。
对于100%的数据:N<=3000。

提示&样例2解释:

这里写图片描述

分析:

这道题我们可以用dp,f[i]表示当圆有2*i个点时,有f[i]种连接方案;
则:
f[0]=1;f[1]=1;f[2]=2;
f[i]=(f[i]+f[i-j]*f[j-1])%100000007;

实现:

var
        i,j,n:longint;
        f:array[0..100000]of int64;
begin
        assign(input,'cirs.in');reset(input);
        assign(output,'cirs.out');rewrite(output);
        readln(n);
        f[0]:=1;
        f[1]:=1;
        f[2]:=2;
        for i:=3 to n do
                for j:=1 to i do
                        f[i]:=(f[i]+f[i-j]*f[j-1])mod 100000007;
        writeln(f[n] mod 100000007);
        close(input);close(output);
end.
Unlike the classical encryption schemes,keys are dispensable in certain PLS technigues, known as the keyless secure strat egy. Sophisticated signal processing techniques such as arti- ficial noise, beamforming,and diversitycan be developed to ensure the secrecy of the MC networks.In the Alice-Bob-Eve model, Alice is the legitimate transmitter, whose intended target is the legitimate receiver Bob,while Eve is the eavesdropper that intercepts the information from Alice to Bob.The secrecy performance is quantified via information leakagei.ethe dif ference of the mutual information between the Alice-Bob and Alice-Eve links. The upper bound of the information leakage is called secrecy capacity realized by a specific distribution of the input symbols, namely,capacity-achieving distribution.The secrecy performance of the diffusion-based MC system with concentration shift keying(CSK)is analyzed from an informa- tion-theoretical point of view,providing two paramount secrecy metrics, i.e., secrecy capacity and secure distance[13].How ever, only the estimation of lower bound secrecy capacity is derived as both links attain their channel capacity.The secrecy capacity highly depends on the system parameters such as the average signal energy,diffusion coefficientand reception duration. Moreover, the distance between the transmitter and the eavesdropper is also an important aspect of secrecy per- formance. For both amplitude and energy detection schemes secure distance is proposed as a secret metricover which the eavesdropper is incapable of signal recovery. Despite the case with CSK,the results of the secure metrics vary with the modulation type(e.g.pulse position,spacetype) and reception mechanism(e.g.passive,partially absorbingper fectly absorbing).For ease of understanding,Figure 3 depicts the modulation types and the corresponding CIRs with different reception mechanisms. Novel signa processing techniques and the biochemical channel properties can further assist the secrecy enhancement in the MC system.The molecular beam forming that avoids information disclosure can be realized via the flow generated in the channel.Besidesnew dimensions of diversity, such as the aforementioned molecular diversity of ionic compounds, can beexploited. Note that the feasibility of these methods can be validated by the derived secrecy metrics.
最新发布
06-13
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值