2^x mod n = 1 acm竞赛题 Give a number n, find the minimum x that satisfies 2^x mod n = 1. Input One positive integer on each line, the value of n. Output If the minimum x exists, print a line with 2^x mod n = 1. Print 2^? mod n = 1 otherwise. You should replace x and n with specific numbers. Sample Input 2 5 Sample Output 2^? mod 2 = 1 2^4 mod 5 = 1
标签: mod satisfies minimum number
上传时间: 2015-06-02
上传用户:qlpqlq
* Function: * 1. Replace the first oldstr with newstr in srcstr * Arguments: * IN : * srcstr * oldstr * newstr * OUT : * srcstr * Return: * 1. If find and replace one oldstr with newstr in srcstr , return 1 * 2. If find no oldstr in srcstr , return 0 * 3. If error (malloc return NULL) return -1 * Notes: * 1. srcstr should be large size enough.
标签: Arguments Function Replace oldstr
上传时间: 2014-12-20
上传用户:Yukiseop
Frequency Scale Conversion From f To f Scale frq2mel mel2frq mel The mel scale is based on the human perception of sinewave pitch. frq2erb erb2frq erb The erb scale is based on the equivalent rectangular bandwidths of the human ear. frq2midi midi2frq midi The midi standard specifies a numbering of semitones with middle C being 60. They can use the normal equal tempered scale or else the pythagorean scale of just intonation. They will in addition output note names in a character format.
标签: Scale Conversion Frequency mel
上传时间: 2015-06-07
上传用户:
Routine mampres: To obtain amplitude response from h(exp(jw)). input parameters: h :n dimensioned complex array. the frequency response is stored in h(0) to h(n-1). n :the dimension of h and amp. fs :sampling frequency (Hz). iamp:If iamp=0: The Amplitude Res. amp(k)=abs(h(k)) If iamp=1: The Amplitude Res. amp(k)=20.*alog10(abs(h(k))). output parameters: amp :n dimensioned real array. the amplitude-frequency response is stored in amp(0) to amp(n-1). Note: this program will generate a data file "filename.dat" . in chapter 2
标签: dimensione parameters amplitude response
上传时间: 2013-12-19
上传用户:xfbs821
The government of a small but important country has decided that the alphabet needs to be streamlined and reordered. Uppercase letters will be eliminated. They will issue a royal decree in the form of a String of B and A characters. The first character in the decree specifies whether a must come ( B )Before b in the new alphabet or ( A )After b . The second character determines the relative placement of b and c , etc. So, for example, "BAA" means that a must come Before b , b must come After c , and c must come After d . Any letters beyond these requirements are to be excluded, so if the decree specifies k comparisons then the new alphabet will contain the first k+1 lowercase letters of the current alphabet. Create a class Alphabet that contains the method choices that takes the decree as input and returns the number of possible new alphabets that conform to the decree. If more than 1,000,000,000 are possible, return -1. Definition
标签: government streamline important alphabet
上传时间: 2015-06-09
上传用户:weixiao99
program kehuji uses Forms, Unit1 in ..\zxc\Unit1.pas {Form1}, Unit2 in ..\zxc\Unit2.pas {Form2}, Unit3 in ..\zxc\Unit3.pas {Form3}, Unit4 in ..\zxc\Unit4.pas {Form4} // Unit3 in C:\Program Files\Borland\Delphi7\Projects\Unit3.pas {Form3}, // Unit4 in C:\Program Files\Borland\Delphi7\Projects\Unit4.pas {Form4} {$R *.res} begin Application.Initialize Application.CreateForm(TForm1, Form1) Application.CreateForm(TForm2, Form2) Application.CreateForm(TForm3, Form3) Application.CreateForm(TForm4, Form4) // Application.CreateForm(TForm3, Form3) // Application.CreateForm(TForm4, Form4) Application.Run end.
标签: zxcUnit pas program kehuji
上传时间: 2014-01-16
上传用户:jing911003
Beginning with an introduction to 802.11b in general, 802.11 Security gives you a broad basis in theory and practice of wireless security, dispelling some of the myths along the way. In doing so, they provide you with the technical grounding required to think about how the rest of the book applies to your specific needs and situations. If you are a network, security, or systems engineer, or anyone interested in deploying 802.11b--based systems, you ll want this book beside you every step of the way.
标签: 802.11 introduction Beginning Security
上传时间: 2013-12-04
上传用户:CHINA526
本源代码所设计的文件系统,具有建立文件(create)、打开文件(open)、读文件(read)、写文件(write)、关闭文件(close)、撤销文件(delete)等功能。在模拟程序中可从键盘上输入文件操作命令来模拟各用户程序中所调用的各种文件操作,用一个结束命令(end)停止程序的执行。
上传时间: 2013-12-13
上传用户:希酱大魔王
在本编译程序中,源语言为PL/0语言,目标语言为假想栈式计算机的汇编语言.PL/0语言是Pascal语言的一个子集,PL/0的编译程序包括了对PL/0语言源程序进行分析处理、编译生成类PCODE代码,并在虚拟机上解释运行生成的类PCODE代码的功能。 PL/0语言编译程序采用以语法分析为核心、一遍扫描的编译方法。词法分析和代码生成作为独立的子程序供语法分析程序调用。语法分析的同时,提供了出错报告功能。在源程序没有错误编译通过的情况下,调用类PCODE解释程序解释执行生成的类PCODE代码。 该软件为PL/0语言编译程序,所实现的扩充功能如下: 1.增加单词:保留字 ELSE,FOR,TO, DOWNTO 2.增加运算 +=,-=,++,-- 3.不等号# 改为 <> 4.增加条件语句的ELSE子句 5.扩充语句: ①FOR <变量>:=<表达式> TO <表达式> DO <语句> ②FOR <变量>:=<表达式> DOWNTO<表达式> DO <语句> 其中,语句①的循环变量的步长为1, 语句②的循环变量的步长为-1。 概述 源文件: *.plo 目标文件: *.COD 实现平台:C++ Builder6.0
上传时间: 2015-06-22
上传用户:hanli8870
These libraries are designed for use with Microsoft Visual C++ version 6.0. Install them by running setup.exe. This will copy the files to various places where MSVC will expect to find them. If setup fails, alternate instructions are below.
标签: Microsoft libraries designed Install
上传时间: 2015-06-23
上传用户:s363994250