Aiti Tribe Story Collection (25): Analysis of Chain Storage Stack and Code Implementation

Aiti Tribe Story Collection (25): Analysis of Chain Storage Stack and Code Implementation

[51CTO.com original article] Xiao Yao graduated from the Computer Science Department of Chongqing University of Posts and Telecommunications. Currently, he is a small Android mobile application development programmer. He loves life and his girlfriend. When he is free, he also likes to play games and study hard. His current life goal is to make money, buy a house, a car, and marry a wife.

[[199073]]

Xiaoyao·Android Development

Introduction to stacks and queues

Friends who have learned the basics of computer programming know that the most common data structures in computers are stacks and queues. The reason why this linear list structure is so common is that their simple but powerful functional characteristics are the basis of many algorithms. When Xiao Yao was in a junior year in Beijing, the interviewer asked him a question during an internship interview, "How to use a stack to implement a queue?" At that time, he fell into a misunderstanding, thinking that the stack the interviewer was talking about was a stack. Due to the first-in-last-out characteristics of the stack, it was conceptually impossible for a stack to complete the function of the queue. As the saying goes, if one stack doesn't work, then two stacks. OK, you are right, at least two stacks are indeed needed. Let's get back to the point. Since stacks and queues are so widely used, how can we implement them through code? Many students may say, isn't this simple? Use a collection or array, so easy! So, what if collections or arrays are not allowed to be used in order to improve execution efficiency? Next, Xiao Yao will analyze it for everyone!

Chain storage stack analysis

I won't explain the concept of stack here. If you don't know, please search Baidu. There are many ways to implement the first-in-last-out feature. As the title says, we will implement chain storage here. What is chain storage? As shown in the following figure:

The basic unit of chain storage is Node. In a node, it is divided into data area and pointer field. The pointer field points to the next node to connect the nodes. Due to the characteristics of the chain, inserting and deleting a node in the chain (except the head and tail of the chain) is relatively expensive, but it is very suitable for implementing stacks or queues. For the stack structure, methods such as pushing and popping data and judging whether the stack bottom has been reached are essential.

Code Implementation

Next, let's see how to implement it with Java code:

  1. /**
  2. * Created by lxh on 2017/8/1.
  3. * QQ-632671653
  4. * Custom chain storage stack
  5. */
  6. public class LinkStack<T> {
  7. private Node<T> top = new Node<>(); //Initialize the top node of the stack
  8. /**
  9. * Data stack operation
  10. * @param data
  11. */
  12. public void push(T data) {
  13. top = new Node<>(data, top);
  14. System.out.println(top.toString());
  15. }
  1. /**
  2. * Data pop operation
  3. * @return
  4. */
  5. public T pop() {
  6. T result = top.data;
  7. if (top.hasNext()) {
  8. top = top.next;
  9. }
  10. return result;
  11. }
  12. //Use internal classes to build nodes
  13. private class Node<T> {
  14. T data; //Use generics to define data domains
  15. Node<T> next; //Define the next node
  16. /**
  17. * Initialize the bottom of the stack in the no-argument constructor and add an end sentinel to the stack
  18. */
  19. Node() {
  20. data = null;
  21. next = null;
  22. }
  23. /**
  24. * Construct each added node object through the parameter construction method
  25. * @param data
  26. * @param next
  27. */
  28. public Node(T data, Node<T> next) {
  29. this.data = data;
  30. this.next = next;
  31. }
  32. /**
  33. * Determine whether the stack has reached the bottom
  34. * @return
  35. */
  36. boolean hasNext() {
  37. return data != null && next != null;
  38. }
  39. @Override
  40. public String toString() {
  41. return "Node{" +
  42. "data=" + data +
  43. ", next=" + next +
  44. '}';
  45. }
  46. }
  47. }

As you can see from the code, generics are used here to ensure the universality of the data type pushed into the stack. The nodes are constructed in the form of inner classes. Because of their privacy, data security can be guaranteed. Students with poor basics may be confused and don't quite understand where this chain is linked to, so Xiaoyao prints out the information in the stack during the push operation. I believe you will understand it at a glance. As shown below:

I believe everyone understands from the infographic that this chain storage stack is formed by recursively adding node objects to the node object to form a link between nodes, which is reflected in the character set as layers of nested objects (because it is written in Java language and there is no pointer in C, so this method is used to replace the pointer). Through the sentinel of the end node, when the data set is null when popping the stack, it can be judged that the data in the stack has been popped.

【Written in ***】

There is a saying among colleagues: Don't reinvent the wheel. But Xiaoyao thinks that even if you don't need to reinvent the wheel, you still have to understand how the wheel is made. If you only know how to call the API, you will lose your competitiveness.

If you are also willing to share your story, please join the 51CTO developer QQ exchange group 542270018 and contact the group owner. We look forward to your wonderful story!

[51CTO original article, please indicate the original author and source as 51CTO.com when reprinting on partner sites]

<<:  A brief discussion on Java's Fork/Join concurrency framework

>>:  From decision trees to random forests: the principle and implementation of tree-based algorithms

Recommend

Reflections and Prospects of iOS Developers from 2016 to 2018

[[222173]] Preface I have been working in iOS dev...

Practical case analysis: How to deeply understand user growth

The concept of User Growth (UG) originated from t...

Top 10 Mobile App Development Trends in 2023

1. Leverage cloud-based services As trends emerge...

In 2020, beware of suffering from "traffic anxiety"!

With the disappearance of traffic dividends, the ...

Building iOS Routers Step by Step

Continue from the previous article Mobile termina...

Build Configurations in Swift

Build Configurations in Swift In Objective-C, we ...

Cancellation and exceptions in coroutines | Introduction to core concepts

In previous articles, we shared with developers s...

Tips for placing Tencent ads in the automotive industry

1. Industry prospects and current situation With ...

20 Social Marketing Growth Strategies for 2021

In 2021, social marketing occupies a very critica...

Tips | 3 principles and 4 strategies for community topic UGC operations

Community content production is generally divided...

Bandwidth and storage costs of renting Tik Tok short video servers

The field of short videos has increasingly become...

618 Tencent News & Tencent Video e-commerce promotion advertising!

During the big promotion, how can we improve our ...