2097. Valid Arrangement of Pairs
Difficulty: Hard
Topics: Depth-First Search, Graph, Eulerian Circuit
You are given a 0-indexed 2D integer array pairs where pairs[i] = [starti, endi]. An arrangement of pairs is valid if for every index i where 1 i-1 == starti.
Return any valid arrangement of pairs.
Note: The inputs will be generated such that there exists a valid arrangement of pairs.
Example 1:
- Input: pairs = [[5,1],[4,5],[11,9],[9,4]]
- Output: [[11,9],[9,4],[4,5],[5,1]]
-
Explanation: This is a valid arrangement since endi-1 always equals starti.
- end0 = 9 == 9 = start1
- end1 = 4 == 4 = start2
- end2 = 5 == 5 = start3
Example 2:
- Input: pairs = [[1,3],[3,2],[2,1]]
- Output: [[1,3],[3,2],[2,1]]
-
Explanation: This is a valid arrangement since endi-1 always equals starti.
- end0 = 3 == 3 = start1
- end1 = 2 == 2 = start2
- The arrangements [[2,1],[1,3],[3,2]] and [[3,2],[2,1],[1,3]] are also valid.
Example 3:
- Input: pairs = [[1,2],[1,3],[2,1]]
- Output: [[1,2],[2,1],[1,3]]
-
Explanation: This is a valid arrangement since endi-1 always equals starti.
- end0 = 2 == 2 = start1
- end1 = 1 == 1 = start2
Constraints:
- 1 5
- pairs[i].length == 2
- 0 i, endi 9
- starti != endi
- No two pairs are exactly the same.
- There exists a valid arrangement of pairs.
Hint:
- Could you convert this into a graph problem?
- Consider the pairs as edges and each number as a node.
- We have to find an Eulerian path of this graph. Hierholzer’s algorithm can be used.
Solution:
We can approach it as an Eulerian Path problem in graph theory. In this case, the pairs can be treated as edges, and the values within the pairs (the start and end) can be treated as nodes. We need to find an Eulerian path, which is a path that uses every edge exactly once, and the end of one edge must match the start of the next edge.
Key Steps:
- Graph Representation: Each unique number in the pairs will be a node, and each pair will be an edge from start[i] to end[i].
-
Eulerian Path Criteria:
- An Eulerian path exists if there are exactly two nodes with odd degrees, and the rest must have even degrees.
- We need to make sure that the graph is connected (though this is guaranteed by the problem statement).
-
Hierholzer's Algorithm: This algorithm can be used to find the Eulerian path. It involves:
- Starting at a node with an odd degree (if any).
- Traversing through the edges, marking them as visited.
- If a node is reached with unused edges, continue traversing until all edges are used.
Plan:
- Build a graph using a hash map to store the adjacency list (each node and its connected nodes).
- Track the degree (in-degree and out-degree) of each node.
- Use Hierholzer's algorithm to find the Eulerian path.
Let's implement this solution in PHP: 2097. Valid Arrangement of Pairs
<?php /** * @param Integer[][] $pairs * @return Integer[][] */ function validArrangement($pairs) { ... ... ... /** * go to ./solution.php */ } // Example usage: $pairs1 = [[5, 1], [4, 5], [11, 9], [9, 4]]; $pairs2 = [[1, 3], [3, 2], [2, 1]]; $pairs3 = [[1, 2], [1, 3], [2, 1]]; print_r(validArrangement($pairs1)); // Output: [[11, 9], [9, 4], [4, 5], [5, 1]] print_r(validArrangement($pairs2)); // Output: [[1, 3], [3, 2], [2, 1]] print_r(validArrangement($pairs3)); // Output: [[1, 2], [2, 1], [1, 3]] ?>
Explanation:
-
Graph Construction:
- We build the graph using an adjacency list where each key is a start node, and the value is a list of end nodes.
- We also maintain the out-degree and in-degree for each node, which will help us find the start node for the Eulerian path.
-
Finding the Start Node:
- An Eulerian path starts at a node where the out-degree is greater than the in-degree by 1 (if such a node exists).
- If no such node exists, the graph is balanced, and we can start at any node.
-
Hierholzer's Algorithm:
- We start from the startNode and repeatedly follow edges, marking them as visited by removing them from the adjacency list.
- Once we reach a node with no more outgoing edges, we backtrack and build the result.
-
Return the Result:
- The result is constructed in reverse order because of the way we backtrack, so we reverse it at the end.
Example Output:
<?php /** * @param Integer[][] $pairs * @return Integer[][] */ function validArrangement($pairs) { ... ... ... /** * go to ./solution.php */ } // Example usage: $pairs1 = [[5, 1], [4, 5], [11, 9], [9, 4]]; $pairs2 = [[1, 3], [3, 2], [2, 1]]; $pairs3 = [[1, 2], [1, 3], [2, 1]]; print_r(validArrangement($pairs1)); // Output: [[11, 9], [9, 4], [4, 5], [5, 1]] print_r(validArrangement($pairs2)); // Output: [[1, 3], [3, 2], [2, 1]] print_r(validArrangement($pairs3)); // Output: [[1, 2], [2, 1], [1, 3]] ?>
Time Complexity:
- Building the graph: O(n), where n is the number of pairs.
- Hierholzer's Algorithm: O(n), because each edge is visited once.
- Overall Time Complexity: O(n).
This approach efficiently finds a valid arrangement of pairs by treating the problem as an Eulerian path problem in a directed graph.
Contact Links
If you found this series helpful, please consider giving the repository a star on GitHub or sharing the post on your favorite social networks ?. Your support would mean a lot to me!
If you want more helpful content like this, feel free to follow me:
- GitHub
The above is the detailed content of Valid Arrangement of Pairs. For more information, please follow other related articles on the PHP Chinese website!

TooptimizePHPcodeforreducedmemoryusageandexecutiontime,followthesesteps:1)Usereferencesinsteadofcopyinglargedatastructurestoreducememoryconsumption.2)LeveragePHP'sbuilt-infunctionslikearray_mapforfasterexecution.3)Implementcachingmechanisms,suchasAPC

PHPisusedforsendingemailsduetoitsintegrationwithservermailservicesandexternalSMTPproviders,automatingnotificationsandmarketingcampaigns.1)SetupyourPHPenvironmentwithawebserverandPHP,ensuringthemailfunctionisenabled.2)UseabasicscriptwithPHP'smailfunct

The best way to send emails is to use the PHPMailer library. 1) Using the mail() function is simple but unreliable, which may cause emails to enter spam or cannot be delivered. 2) PHPMailer provides better control and reliability, and supports HTML mail, attachments and SMTP authentication. 3) Make sure SMTP settings are configured correctly and encryption (such as STARTTLS or SSL/TLS) is used to enhance security. 4) For large amounts of emails, consider using a mail queue system to optimize performance.

CustomheadersandadvancedfeaturesinPHPemailenhancefunctionalityandreliability.1)Customheadersaddmetadatafortrackingandcategorization.2)HTMLemailsallowformattingandinteractivity.3)AttachmentscanbesentusinglibrarieslikePHPMailer.4)SMTPauthenticationimpr

Sending mail using PHP and SMTP can be achieved through the PHPMailer library. 1) Install and configure PHPMailer, 2) Set SMTP server details, 3) Define the email content, 4) Send emails and handle errors. Use this method to ensure the reliability and security of emails.

ThebestapproachforsendingemailsinPHPisusingthePHPMailerlibraryduetoitsreliability,featurerichness,andeaseofuse.PHPMailersupportsSMTP,providesdetailederrorhandling,allowssendingHTMLandplaintextemails,supportsattachments,andenhancessecurity.Foroptimalu

The reason for using Dependency Injection (DI) is that it promotes loose coupling, testability, and maintainability of the code. 1) Use constructor to inject dependencies, 2) Avoid using service locators, 3) Use dependency injection containers to manage dependencies, 4) Improve testability through injecting dependencies, 5) Avoid over-injection dependencies, 6) Consider the impact of DI on performance.

PHPperformancetuningiscrucialbecauseitenhancesspeedandefficiency,whicharevitalforwebapplications.1)CachingwithAPCureducesdatabaseloadandimprovesresponsetimes.2)Optimizingdatabasequeriesbyselectingnecessarycolumnsandusingindexingspeedsupdataretrieval.


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

MinGW - Minimalist GNU for Windows
This project is in the process of being migrated to osdn.net/projects/mingw, you can continue to follow us there. MinGW: A native Windows port of the GNU Compiler Collection (GCC), freely distributable import libraries and header files for building native Windows applications; includes extensions to the MSVC runtime to support C99 functionality. All MinGW software can run on 64-bit Windows platforms.

mPDF
mPDF is a PHP library that can generate PDF files from UTF-8 encoded HTML. The original author, Ian Back, wrote mPDF to output PDF files "on the fly" from his website and handle different languages. It is slower than original scripts like HTML2FPDF and produces larger files when using Unicode fonts, but supports CSS styles etc. and has a lot of enhancements. Supports almost all languages, including RTL (Arabic and Hebrew) and CJK (Chinese, Japanese and Korean). Supports nested block-level elements (such as P, DIV),

SecLists
SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.

EditPlus Chinese cracked version
Small size, syntax highlighting, does not support code prompt function

DVWA
Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is very vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, to help web developers better understand the process of securing web applications, and to help teachers/students teach/learn in a classroom environment Web application security. The goal of DVWA is to practice some of the most common web vulnerabilities through a simple and straightforward interface, with varying degrees of difficulty. Please note that this software
