After using Java collections for so long, I have never systematically studied the collection structure of Java. Today I personally drew the following class diagram, and finally gained something.
1. All collections implement the Iterable interface.
The Iterable interface contains an abstract method: Iterator
Iterator: It contains three methods, hashNext(), next(), and remove(), through which collection traversal and element deletion can be achieved, for example:
Collection
list.add("a");
list.add("b");
list.add("c");
Iterator
while (iterator .hasNext()) {
String element = iterator.next();
System.out.println(element);//a b c
}
System.out.println(list);//[a, b, c] iterator = list.iterator(); iterator.next();
iterator.remove();
System.out.println(list);//[b, c]
ps: Why not What about directly implementing the Iterator interface? Because: Iterator will carry the position information of the current collection, and it will not start from 0 the next time it is used; and the Iterable interface returns an Iterator object each time (Iterator is implemented through an internal class), and each iterator is independent of each other. Influence.
2. ListIterator
Starting from AbstractList, the public ListIterator
AbstractList
list.add("a");
list.add("b");
list.add("c");
ListIterator
while (iterator.hasPrevious()) {
String element = iterator.previous();
System.out.println(element);//c,b,a
}
3. Comparison
ArrayList: allows to store duplicate elements, and the elements are ordered, making random access more convenient.
LinkedList: Linked list implementation, better than ArrayList when inserting and deleting.
HashSet: Duplicate elements and unordered elements are not allowed (the hash function sorts the elements and can be queried quickly), and null values are allowed.
TreeSet: Red-black tree sorting, can be sorted, the elements contained must implement the Comparable interface and define the compareTo method, and null values are not allowed.
HashMap: Thread-unsafe, both key and value are allowed to be null. To determine whether the key is included, use the containsKey() method. Repeated keys are not allowed. The default size of the hash array is 16, and it must be an exponent of 2. Recalculate the hash value. .
HashTable: Thread-safe, null values are not allowed in key and value, and duplicate keys are not allowed. The default size of the array is 11, and the increasing method is old*2+1, using the hash value of the containing object.
4. Collections and Arrays
Collections: a special class under java.util, which contains various static methods related to collection operations, and can implement operations such as searching, sorting, and thread safety for various collections. .
Arrays: A special class under java.util, used to operate arrays, providing static methods such as search, sorting, copying, and conversion.

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

mPDF
mPDF is a PHP library that can generate PDF files from UTF-8 encoded HTML. The original author, Ian Back, wrote mPDF to output PDF files "on the fly" from his website and handle different languages. It is slower than original scripts like HTML2FPDF and produces larger files when using Unicode fonts, but supports CSS styles etc. and has a lot of enhancements. Supports almost all languages, including RTL (Arabic and Hebrew) and CJK (Chinese, Japanese and Korean). Supports nested block-level elements (such as P, DIV),

SublimeText3 Linux new version
SublimeText3 Linux latest version

MantisBT
Mantis is an easy-to-deploy web-based defect tracking tool designed to aid in product defect tracking. It requires PHP, MySQL and a web server. Check out our demo and hosting services.

SublimeText3 Chinese version
Chinese version, very easy to use

Safe Exam Browser
Safe Exam Browser is a secure browser environment for taking online exams securely. This software turns any computer into a secure workstation. It controls access to any utility and prevents students from using unauthorized resources.