2290. Minimum Obstacle Removal to Reach Corner
Difficulty: Hard
Topics: Array, Breadth-First Search, Graph, Heap (Priority Queue), Matrix, Shortest Path
You are given a 0-indexed 2D integer array grid of size m x n. Each cell has one of two values:
- 0 represents an empty cell,
- 1 represents an obstacle that may be removed.
You can move up, down, left, or right from and to an empty cell.
Return the minimum number of obstacles to remove so you can move from the upper left corner (0, 0) to the lower right corner (m - 1, n - 1).
Example 1:
- Input: grid = [[0,1,1],[1,1,0],[1,1,0]]
- Output: 2
-
Explanation: We can remove the obstacles at (0, 1) and (0, 2) to create a path from (0, 0) to (2, 2).
- It can be shown that we need to remove at least 2 obstacles, so we return 2.
- Note that there may be other ways to remove 2 obstacles to create a path.
Example 2:
- Input: grid = [[0,1,0,0,0],[0,1,0,1,0],[0,0,0,1,0]]
- Output: 0
- Explanation: We can move from (0, 0) to (2, 4) without removing any obstacles, so we return 0.
Constraints:
- m == grid.length
- n == grid[i].length
- 1 5
- 2 5
- grid[i][j] is either 0 or 1.
- grid[0][0] == grid[m - 1][n - 1] == 0
Hint:
- Model the grid as a graph where cells are nodes and edges are between adjacent cells. Edges to cells with obstacles have a cost of 1 and all other edges have a cost of 0.
- Could you use 0-1 Breadth-First Search or Dijkstra’s algorithm?
Solution:
We need to model this problem using a graph where each cell in the grid is a node. The goal is to navigate from the top-left corner (0, 0) to the bottom-right corner (m-1, n-1), while minimizing the number of obstacles (1s) we need to remove.
Approach:
-
Graph Representation:
- Each cell in the grid is a node.
- Movement between adjacent cells (up, down, left, right) is treated as an edge.
- If an edge moves through a cell with a 1 (obstacle), the cost is 1 (remove the obstacle), and if it moves through a 0 (empty cell), the cost is 0.
-
Algorithm Choice:
- Since we need to minimize the number of obstacles removed, we can use 0-1 BFS (Breadth-First Search with a deque) or Dijkstra's algorithm with a priority queue.
- 0-1 BFS is suitable here because each edge has a cost of either 0 or 1.
-
0-1 BFS:
- We use a deque (double-ended queue) to process nodes with different costs:
- Push cells with cost 0 to the front of the deque.
- Push cells with cost 1 to the back of the deque.
- The idea is to explore the grid and always expand the path that does not require obstacle removal first, and only remove obstacles when necessary.
- We use a deque (double-ended queue) to process nodes with different costs:
Let's implement this solution in PHP: 2290. Minimum Obstacle Removal to Reach Corner
<?php /** * @param Integer[][] $grid * @return Integer */ function minimumObstacles($grid) { ... ... ... /** * go to ./solution.php */ } // Test Case 1 $grid1 = [ [0, 1, 1], [1, 1, 0], [1, 1, 0] ]; echo minimumObstacles($grid1) . PHP_EOL; // Output: 2 // Test Case 2 $grid2 = [ [0, 1, 0, 0, 0], [0, 1, 0, 1, 0], [0, 0, 0, 1, 0] ]; echo minimumObstacles($grid2) . PHP_EOL; // Output: 0 ?>
Explanation:
-
Input Parsing:
- The grid is taken as a 2D array.
- Rows and columns are calculated for bounds checking.
-
Deque Implementation:
- SplDoublyLinkedList is used to simulate the deque. It supports adding elements at the front (unshift) or the back (push).
-
Visited Array:
- Keeps track of cells already visited to avoid redundant processing.
-
0-1 BFS Logic:
- Start from (0, 0) with a cost of 0.
- For each neighboring cell:
- If it's empty (grid[nx][ny] == 0), add it to the front of the deque with the same cost.
- If it's an obstacle (grid[nx][ny] == 1), add it to the back of the deque with an incremented cost.
-
Return the Result:
- When the bottom-right corner is reached, return the cost.
- If no valid path exists (though the problem guarantees one), return -1.
Complexity:
- Time Complexity: O(m x n), where m is the number of rows and n is the number of columns. Each cell is processed once.
- Space Complexity: O(m x n), for the visited array and deque.
This implementation works efficiently within the given constraints.
Contact Links
If you found this series helpful, please consider giving the repository a star on GitHub or sharing the post on your favorite social networks ?. Your support would mean a lot to me!
If you want more helpful content like this, feel free to follow me:
- GitHub
The above is the detailed content of Minimum Obstacle Removal to Reach Corner. For more information, please follow other related articles on the PHP Chinese website!

In PHP, trait is suitable for situations where method reuse is required but not suitable for inheritance. 1) Trait allows multiplexing methods in classes to avoid multiple inheritance complexity. 2) When using trait, you need to pay attention to method conflicts, which can be resolved through the alternative and as keywords. 3) Overuse of trait should be avoided and its single responsibility should be maintained to optimize performance and improve code maintainability.

Dependency Injection Container (DIC) is a tool that manages and provides object dependencies for use in PHP projects. The main benefits of DIC include: 1. Decoupling, making components independent, and the code is easy to maintain and test; 2. Flexibility, easy to replace or modify dependencies; 3. Testability, convenient for injecting mock objects for unit testing.

SplFixedArray is a fixed-size array in PHP, suitable for scenarios where high performance and low memory usage are required. 1) It needs to specify the size when creating to avoid the overhead caused by dynamic adjustment. 2) Based on C language array, directly operates memory and fast access speed. 3) Suitable for large-scale data processing and memory-sensitive environments, but it needs to be used with caution because its size is fixed.

PHP handles file uploads through the $\_FILES variable. The methods to ensure security include: 1. Check upload errors, 2. Verify file type and size, 3. Prevent file overwriting, 4. Move files to a permanent storage location.

In JavaScript, you can use NullCoalescingOperator(??) and NullCoalescingAssignmentOperator(??=). 1.??Returns the first non-null or non-undefined operand. 2.??= Assign the variable to the value of the right operand, but only if the variable is null or undefined. These operators simplify code logic, improve readability and performance.

CSP is important because it can prevent XSS attacks and limit resource loading, improving website security. 1.CSP is part of HTTP response headers, limiting malicious behavior through strict policies. 2. The basic usage is to only allow loading resources from the same origin. 3. Advanced usage can set more fine-grained strategies, such as allowing specific domain names to load scripts and styles. 4. Use Content-Security-Policy-Report-Only header to debug and optimize CSP policies.

HTTP request methods include GET, POST, PUT and DELETE, which are used to obtain, submit, update and delete resources respectively. 1. The GET method is used to obtain resources and is suitable for read operations. 2. The POST method is used to submit data and is often used to create new resources. 3. The PUT method is used to update resources and is suitable for complete updates. 4. The DELETE method is used to delete resources and is suitable for deletion operations.

HTTPS is a protocol that adds a security layer on the basis of HTTP, which mainly protects user privacy and data security through encrypted data. Its working principles include TLS handshake, certificate verification and encrypted communication. When implementing HTTPS, you need to pay attention to certificate management, performance impact and mixed content issues.


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

SecLists
SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.

Notepad++7.3.1
Easy-to-use and free code editor

Dreamweaver CS6
Visual web development tools

Atom editor mac version download
The most popular open source editor

SublimeText3 Chinese version
Chinese version, very easy to use