DCEPC11E - Easy Password


This is the year 2100. Pranjali ma’am due to her intelligence survived this far, by her “Secret Potion” to freeze her age. She keeps her lotion in a very secret vault which is electronic password protected. This is a very special system designed by our great Sameer sir, which don’t take any specific string as a password. Rather than it takes a “Tree”, yes you heard that right a “Tree” of numbers as a password. Your password should be exact to the tree both in structure and value to unlock the vault. Its high time and many hackers are trying to hack the system. So Pranjali ma’am was bit worried and wanted to change the password. Some of the new passwords are very vulnerable so Sameer sir told not to use them. You have to make the new password tree for Pranjali ma’am to keep her “Secret Potion” safe. You are given old password tree, and the one restricted password tree provided by Sameer sir. The structure and value of both might not be same as Sameer sir don’t know the exact password, he only know the current hacking pattern of the hackers.

You have to make a new password tree with same structure as old password tree, with the nodes of old password tree permuted in some order and any new node should not be exactly equal in position and value to restricted password tree. The position of a node is defined by the sequence of moves (Left / Right) required to go down from the root to that node.

If there are multiple answers, print the one whose difference is minimum from the old password tree.

Calculating difference between trees:

Diff = |sum((old[node[i]] - new[node[i]])*10^i)| where i is n-1 to 0. The ordering of nodes is based on level order traversal of trees. i.e. i will be n-1 for root node and so on.

Input

First line contains t, number of test cases. In each test case first line contain n and m, n is the number of nodes of old password tree and m is the number of nodes of restricted password tree. Next line contains n space separated numbers(value of nodes of old password tree). Next n lines contains expression like A B, in ith line A and B is the left and right child of node with index i(0 based). If there is no right or left child of a node -1 will be provided in place of any index.

Next line contains m space separated numbers (value of nodes of restricted password tree). Then this tree is also described as the tree above.

Output

One integer. Minimum diff as per the above formula between old tree and new tree OR -1 if no such tree is possible.

Constraints

1 <= T <= 50
0 <= node_value <= 9
1 <= n <= 18

Note:

  1. New tree can be same as old tree.
  2. If no such tree is possible print -1.
  3. All trees in the problem are Binary Trees.

Example

Input:
1
3 3
5 4 8
1 2
-1 -1
-1 -1
5 1 8
1 2
-1 -1
-1 -1

Output:
63

Explanation:

According to the rule specified above the most feasible tree is rooted at node with value 4 and its left child being 8 and right child being 5. So the minimum diff is 63.


hide comments
tehnar: 2016-04-21 12:06:56

Why not to add more languares (for example, C++14)?

Amaterasu: 2016-04-18 22:07:45

Does first element in node value array always has to be root? i.e. could it happen for the above test case that node values are 5 4 8, but tree structure is:
-1 -1
0 2
-1 -1
so instead of 5 being root, 4 is.

Encho: 2016-04-06 19:55:40

@Siarhei Kulik, n-2 for left and n-3 for right. It's basically level by level (by depth) and left-to-right on each level, with all having different number (so all n-1 to 0)

Siarhei Kulik: 2016-04-06 17:18:26

"ordering of nodes is based on level order traversal of trees. i.e. i will be n-1 for root node and so on."

So, what does it mean?

Okay, $i$ will be equal to $n-1$ for the root node, what's next? Consider the root node has two children - the left and the right one. What is the value of $i$ for these children? is it $n-2$ for both of them? Or $n-2$ for the left one and $n-3$ for the right one?

Last edit: 2016-04-06 17:39:18
Encho: 2016-04-03 19:11:01

What are the constraints of m?


Added by:dce coders
Date:2013-10-05
Time limit:0.5s
Source limit:50000B
Memory limit:1536MB
Cluster: Cube (Intel G860)
Languages:C CSHARP C++ 4.3.2 CPP C99 HASK JAVA PAS-GPC PAS-FPC PYTHON PYTHON3 PY_NBC