"left child, that is K1" shaking vigorously. The K1 becomes the root node, K2 becomes the right subtree of K1, and the right subtree of K1 becomes the K2 left subtree.The rotation of the LR?? When LR is out of balance, it takes two rotations to restore the AVL tree to a balanced position. Such as:?? The first rotation is "RR rotation" around "K1", and the second is "ll rotation" around "K3". Copyright NOTICE: This article for Bo Master original article, if you need to reprint please specify the
Java is very inconvenient to use because of the generic eraseAbstract classBasequeue{ AbstractBoolean enQueue (T x); AbstractT front (t x);//Note that There's a difference between this and C + +, which directly returns the header element AbstractBoolean Delqueue (); Abstract voidClear ();}classQueue{ intmmaxsize,mindexf,mindexr; T []mqueue; @SuppressWarnings ("unchecked") Queue (ClassintMaxSize) {mmaxsize=maxSize; MINDEXF=mindexr=0; Mqueue
Queue for learning basic knowledge about java Data Structure
The queue is FIFO.
Use java to implement queue code:
/** Queue */public class Queue {private int maxSize; // maximum Queue private long [] queArray; // Queue array private int front; // Queue header private int rear; // private int nItems at the end of the te
on hash
The entire allocation process is artificially mastered, and when certain requests must be assigned to the specified server, the modifications are simpler
Disadvantages:
Large number of coding needs rigorous testing
Need to proactively maintain a routing table, storage is an issue to consider
When the request volume is large, the routing table capacity will increase, you can consider to deposit in Redis
The above is my underst
right sub-tree by the middle sequence. ③ post-order: Left and right root if the binary tree is non-empty, according to the post-secondary traversal of the left subtree, and then traverse the tree, and then access the root node. Two fork Tree Delete: ① no left no right: divided into: root node non-root node, but is the leaf node (divided into: Zuo right leaf) ② has left no right: divided into: root node non-root node (divided into: Left node right node) ③ There is no right left: divi
. Link.insertlast (l); - } the Publiclinkq Remove () { the return This. Link.deletefirst (); the } the PublicString toString () { - return This. link.tostring (); the } the Public voiddisplay () { the System.out.println (toString ());94 } the } the Public classLinkqueuedemo { the Public Static voidMain (string[] args) {98Linkqueue queue =Newlinkqueue (); About for(inti = 0; I ) { -LINKQ l=NewLINKQ (i);101 Queue.insert (l);102 Queue.
: Network Disk DownloadFirst, the content of the book is a foreign data structure and algorithm analysis of the classic textbook, using the excellent Java programming language as the implementation tool to discuss the data structure (the method of organizing a large number o
The following is an implementation of the LinkedList generic class that can be used. Here the list class name is Mylinkedlist, avoid duplication with the class library.Mylinkedlist is implemented as a doubly linked list, and is persisted to the reference at both ends of the table. This allows you to maintain the cost of constant time for each operation as long as the operation takes place in a known location. This known location can be an endpoint, or it can be a location specified by an iterato
Data Structure tutorial (Java description) edited by Xu xiaokai-review abstract 03
Chapter 1 linear table
Sequential storage and operation implementation of linear tables
Public class sequencelist implements list {final int maxsize = 10; // array initial length private object [] listarray; // array declaration, element type: objectprivate int length; // current l
: Network Disk DownloadContent Introduction······This book is a classic textbook on data structures and algorithmic analysis in foreign countries, using the excellent Java programming language as the implementation tool to discuss data structures (methods for organizing large amounts of data) and algorithmic analysis (
I. Overview of the principle of linkedlist implementationLike LinkedList and ArrayList, the List interface is implemented, but its internal data structure is fundamentally different. LinkedList is based on a linked list (which can be distinguished by name), so its insert and delete operations are more efficient than ArrayList. But also because it is based on the linked list, so the efficiency of random acce
exception, first determine whether two modcount are synchronized, and then throw an exception.public int Nextindex () {return cursor;}This method gets the next element subscript, which is the cursor value.public int Previousindex () {return cursor-1;}This method gets the previous element subscript, which is the cursor value minus 1.public void Set (E e) {if (Lastret throw new IllegalStateException ();Checkforcomodification ();try {AbstractList.this.set (Lastret, E);Expectedmodcount = Modcount;}
Click to enter _ more _java thousand ask1. How to iterate through an arrayWhen we work with arrays, we often use a for loop or a foreach loop to iterate because all the elements in the array are of the same type and the size of the array is known.Learn what an array looks here: What is an array in JavaSee the For loop here: How to Loop through JavaUse for loop traversal Public classTestarray { Public Static void Main(string[] args) {Double[] MyList = {1.9,2.9,3.4,3.5};//Print all the array eleme
2. Set T1 (n) =o (f (n)), T2 (n) =o (f (n)), then:T1 (n)-t2 (n) =o (f (n)) False if 1-bit 2n,2 is NT1 (n)/t2 (n) =o (1) False, constant instead of 1.7. Analysis of Time complexity(1) for (i:0~n) {for (j:0~i)} The complexity of the loop is O (N2)(2) 1 sum = 0 2 for (i = 1 ; I ) 3 For (j = 1 ; J ) 4 if (j% i = = 0 ) 5 for (k = 0 ; K ) 6 sum++; O (N4). ② behavior N,③ behavior N2, but three rows after the ④ line has a j i = = 0 of the judging conditions, set up I, so ③④ for the ove
sortingLinkedhashset: Based on the hash value to determine the location of the element storage, while using the linked list to maintain the order of the elements before, so he is orderlyAdvantage: Iterative speed is better than hashset, insert delete check (because the relationship between the elements need to be maintained before and after maintenance)HashMap: Finds the position of entry in another array based on the hash code in the array, traversing with iteratorHashTable: Thread safe, do no
indicate whether the specified object is found and deleted
void Removeelementat (int index) deletes the element at the specified position
void RemoveallelementS() removes all elements from the vector object, with a size of 0
int size () Gets the current length of the vector
StackStack inherits the Vector,stack reuse of vector storage object space and access to the linear table method, and stack advanced features can be seen as a special case of vectors1. Constructors
S
[BC, C], the length of the common element is 0;
-the "ABCD" prefix is [A, AB, ABC], suffix [BCD, CD, D], the length of the common element is 0;
-the "abcda" prefix is [A, AB, ABC, ABCD], the suffix is [bcda, CDA, DA, a], the common element is "a", the length is 1;
-"Abcdab" is prefixed with [A, AB, ABC, ABCD, abcda], suffix [Bcdab, Cdab, DAB, AB, B], the total element is "AB", the length is 2;
-"ABCDABD" is prefixed with [A, AB, ABC, ABCD, ABCDA, Abcdab], suffix [bcdabd, cdabd,
} + } - $ //get the position index to start matching $ if(J = =sub.length ()) { -index = i-sub.length (); - } the returnindex; - }Wuyi}//1 //testing of the KMP algorithm2 Public classTest {3 /**4 * @paramargs5 */6 Public Static voidMain (string[] args) {7String src = "Aaaaaaab";8String sub = "Abcdabdabd";9 int[] Next =Kmp.getnext (sub);Ten //int[] Next = LENGTHKMP (Sub.tochararray ()); One for(
; } Private int index) { return (E) a[index]; }Vector: Read operations need to add object lock, high concurrency situation, lock competition affect performance. Public synchronized E get (int index) { if (index >= elementcount) throwNew arrayindexoutofboundsexception (index); return Elementdata (index); }2. Write operationCopyonwritearraylist: A lock is required and each write operation requires an array copy for poor performance. Publ
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.