BitSet: It is a byte set, which can be used to represent integers and perform operations such as intersection and union of two sets.
We know that the smallest unit of computer storage is bit, and the smallest unit we use in java programs is byte Byte. The conversion relationship between them is 1Byte=8bit. BitSet represents the size of the integer data based on the location of the bits. For example: 16 is in the 16th position, 5 is in the 5th position, so the following BitSet can represent the set {5,16}
By analyzing the source code of BitSet, we know that BitSet provides two constructors, One is BitSet(), without parameters, and the other is BitSet(int nbits); if we use the constructor without parameters to create a BitSet object, an object with a default length of 64 bits will be created, and the data size that this object can represent It is 1~64, but it doesn't matter even if we put data greater than 64, because BitSet is self-increasing, and the maximum value can be Integer.MAX_VALUE=2147483647.
It is not difficult to understand its function once you know the representation method. For example, if the union of the above set and {2,23,48} is found, it becomes a bit-coded OR operation.
00000000 00000000 00000000 00000000 00000000 00000000 10000000 00100000 Set {5,16}
00000000 00000000 100000 00 00000000 00000000 01000000 00000000 00000010 The result of the OR operation of the set {2,23,48}
is
00000000 00000000 10000000 00000000 00000 000 01000000 10000000 00100010, so the result is {2,5,16,23,48}
Other larger numbers are nothing more than longer bit codes.
Note:
If you create a BitSet set with a maximum number of digits, BitSet bitSet = new BitSet(Integer.MAX_VALUE);
The following error will be reported
Exception in thread "main" java.lang.OutOfMemoryError: Java heap space
at java.util.BitSet.initWords(BitSet.java:144)
at java.util.BitSet.
at Test.main(Test.java:10)
This shows that the java heap space is insufficient and can be changed as follows:
Other reports of java.lang.OutOfMemoryError: Java heap space errors can also be changed in this way

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

SublimeText3 Chinese version
Chinese version, very easy to use

mPDF
mPDF is a PHP library that can generate PDF files from UTF-8 encoded HTML. The original author, Ian Back, wrote mPDF to output PDF files "on the fly" from his website and handle different languages. It is slower than original scripts like HTML2FPDF and produces larger files when using Unicode fonts, but supports CSS styles etc. and has a lot of enhancements. Supports almost all languages, including RTL (Arabic and Hebrew) and CJK (Chinese, Japanese and Korean). Supports nested block-level elements (such as P, DIV),

DVWA
Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is very vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, to help web developers better understand the process of securing web applications, and to help teachers/students teach/learn in a classroom environment Web application security. The goal of DVWA is to practice some of the most common web vulnerabilities through a simple and straightforward interface, with varying degrees of difficulty. Please note that this software

Dreamweaver Mac version
Visual web development tools

SecLists
SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.