


No matter what programming language it is, I believe that students who have written a few lines of code will be familiar with recursion. Take a simple factorial calculation as an example:
function factorial(n) { if (n <= 1) { return 1; } else { return n * factorial(n-1); } }
We can see that recursion is a call to itself within a function. So here comes the question. We know that in Javascript, there is a type of function called an anonymous function. It has no name. How to call it? Of course you can say that you can assign the anonymous function to a constant:
const factorial = function(n){ if (n <= 1) { return 1; } else { return n * factorial(n-1); } }
This is of course possible. But for some situations, like when a function is written without knowing that it is going to be assigned to an explicit variable, it will run into trouble. For example:
(function(f){ f(10); })(function(n){ if (n <= 1) { return 1; } else { return n * factorial(n-1);//太依赖于上下文变量名 } }) //Uncaught ReferenceError: factorial is not defined(…)
So is there a way that does not require giving accurate function names (function reference variable names) at all?
arguments.callee
We know that inside any function
, a variable called arguments
can be accessed.
(function(){console.dir(arguments)})(1,2)
Print out the details of this arguments
variable. It can be seen that he is an instance of Arguments
, and from the data structure From a technical point of view, it is an array-like object. In addition to the array-like element members and length
properties, it also has a callee
method. So what does this callee
method do? Let's take a look at MDN
callee
which is the property of thearguments
object. Within the function's body, it can point to the currently executing function. This is useful when the function is anonymous, such as a function expression without a name (also called an "anonymous function").
Haha, obviously this is what we want. The next step is:
(function(f){ console.log(f(10)); })(function(n){ if (n <= 1) { return 1; } else { return n * arguments.callee(n-1); } }) //output: 3628800
But there is still a problem. The MDN document clearly states that
Warning
: In the strict requirements of ECMAScript fifth edition (ES5) The use of arguments.callee() is prohibited in patterns.
Oh, it turns out that it is not used in ES5’s use strict;
, so in ES6, let’s change it to ES6’s arrow function
and write it down. :
((f) => console.log(f(10)))( (n) => n <= 1? 1: arguments.callee(n-1)) //Uncaught ReferenceError: arguments is not defined(…)
Those who have a certain ES6 foundation may have thought about it for a long time. The arrow function is a shorthand function expression, and it has the this
value of the lexical scope ( That is, objects such as this
, arguments
, super
and new.target
will not be newly generated in their own scope), and they are all anonymous.
then what should we do? Hehe, we need to use a little FP thinking.
Y Combinator
There are countless articles about Y Combinator
. This was written by Haskell B. Curry, a famous logician who studied under Hilbert (Haskell language is Named after him, and the Curry technique in functional programming languages is also named after him) the combinatorial operator "invented" (Haskell studies combinatorial logic) seems to have a magical power, it can calculate Determine the fixed point of the lambda expression (function). This makes recursion possible.
A concept needs to be told hereFixed-point combinator
:
Fixed-point combinator (English: Fixed-point combinator, or fixed-point calculation sub) is a higher-order function that computes a fixed point of other functions.
The fixed point of function f is a value x such that
f(x) = x
. For example, 0 and 1 are fixed points of the function f(x) = x^2 because 0^2 = 0 and 1^2 = 1. Whereas the fixed point of a first-order function (a function on simple values such as integers) is a first-order value, the fixed point of a higher-order function f is another function g such thatf(g) = g
. Then, the fixed point operator is any function fix such that for any function f,
f(fix(f)) = fix(f)
. Fixed point combinators are allowed to be defined Anonymous recursive function. They can be defined using the non-recursive lambda abstraction.
The well-known (and probably simplest) fixed-point combinator in the untyped lambda calculus is called the Y combinator.
Next, we use certain calculations to derive the Y combination.
// 首先我们定义这样一个可以用作求阶乘的递归函数 const fact = (n) => n<=1?1:n*fact(n-1) console.log(fact(5)) //120 // 既然不让这个函数有名字,我们就先给这个递归方法一个叫做self的代号 // 首先是一个接受这个递归函数作为参数的一个高阶函数 const fact_gen = (self) => (n) => n<=1?1:n*self(n-1) console.log(fact_gen(fact)(5)) //120 // 我们是将递归方法和参数n,都传入递归方法,得到这样一个函数 const fact1 = (self, n) => n<=1?1:n*self(self, n-1) console.log(fact1(fact1, 5)) //120 // 我们将fact1 柯理化,得到fact2 const fact2 = (self) => (n) => n<=1?1:n*self(self)(n-1) console.log(fact2(fact2)(5)) //120 // 惊喜的事发生了,如果我们将self(self)看做一个整体 // 作为参数传入一个新的函数: (g)=> n<= 1? 1: n*g(n-1) const fact3 = (self) => (n) => ((g)=>n <= 1?1:n*g(n-1))(self(self)) console.log(fact3(fact3)(5)) //120 // fact3 还有一个问题是这个新抽离出来的函数,是上下文有关的 // 他依赖于上文的n, 所以我们将n作为新的参数 // 重新构造出这么一个函数: (g) => (m) => m<=1?1:m*g(m-1) const fact4 = (self) => (n) => ((g) => (m) => m<=1?1:m*g(m-1))(self(self))(n) console.log(fact4(fact4)(5)) // 很明显fact4中的(g) => (m) => m<=1?1:m*g(m-1) 就是 fact_gen // 这就很有意思啦,这个fact_gen上下文无关了, 可以作为参数传入了 const weirdFunc = (func_gen) => (self) => (n) => func_gen(self(self))(n) console.log(weirdFunc(fact_gen)(weirdFunc(fact_gen))(5)) //120 // 此时我们就得到了一种Y组合子的形式了 const Y_ = (gen) => (f) => (n)=> gen(f(f))(n) // 构造一个阶乘递归也很easy了 const factorial = Y_(fact_gen) console.log(factorial(factorial)(5)) //120 // 但上面这个factorial并不是我们想要的 // 只是一种fact2,fact3,fact4的形式 // 我们肯定希望这个函数的调用是factorial(5) // 没问题,我们只需要把定义一个 f' = f(f) = (f)=>f(f) // eg. const factorial = fact2(fact2) const Y = gen => n => (f=>f(f))(gen)(n) console.log(Y(fact2)(5)) //120 console.log(Y(fact3)(5)) //120 console.log(Y(fact4)(5)) //120
Having deduced this point, you already feel a shiver down your spine. Anyway, this is the first time I came into contact with the article on Cantor, Gödel, and Turing - The Eternal Golden Diagonal. When I came into contact with it, I was instantly impressed by this way of expressing programs in mathematical language.
Come on, let’s recall whether we finally got an indefinite point operator, which can find the fixed point of a higher-order functionf(Y(f)) = Y (f)
. Pass a function into an operator (function) and get a function that has the same function as itself but is not your own. This statement is a bit awkward, but it is full of flavor.
Okay, let’s go back to the original question, how to complete the recursion of anonymous functions? With Y combinator it is very simple:
/*求不动点*/ (f => f(f)) /*以不动点为参数的递归函数*/ (fact => n => n <= 1 ? 1 : n * fact(fact)(n - 1)) /*递归函数参数*/ (5) // 120
曾经看到过一些说法是”最让人沮丧是,当你推导出它(Y组合子)后,完全没法儿通过只看它一眼就说出它到底是想干嘛”,而我恰恰认为这就是函数式编程的魅力,也是数学的魅力所在,精简优雅的公式,背后隐藏着复杂有趣的推导过程。
总结
务实点儿讲,匿名函数的递归调用,在日常的js开发中,用到的真的很少。把这个问题拿出来讲,主要是想引出对arguments
的一些讲解和对Y组合子
这个概念的一个普及。
但既然讲都讲了,我们真的用到的话,该怎么选择呢?来,我们喜闻乐见的benchmark下: 分别测试:
// fact fact(10) // Y (f => f(f))(fact => n => n <= 1 ? 1 : n * fact(fact)(n - 1))(10) // Y' const fix = (f) => f(f) const ygen = fix(fact2) ygen(10) // callee (function(n) {n<=1?1:n*arguments.callee(n-1)})(10)
环境:Macbook pro(2.5 GHz Intel Core i7), node-5.0.0(V8:4.6.85.28) 结果:
fact x 18,604,101 ops/sec ±2.22% (88 runs sampled)
Y x 2,799,791 ops/sec ±1.03% (87 runs sampled)
Y’ x 3,678,654 ops/sec ±1.57% (77 runs sampled)
callee x 2,632,864 ops/sec ±0.99% (81 runs sampled)
可见Y和callee的性能相差不多,因为需要临时构建函数,所以跟直接的fact递归调用有差不多一个数量级的差异,将不定点函数算出后保存下来,大概会有一倍左右的性能提升。
以上就是JavaScript 中匿名函数的递归调用的代码详细介绍的内容,更多相关内容请关注PHP中文网(www.php.cn)!

去掉重复并排序的方法:1、使用“Array.from(new Set(arr))”或者“[…new Set(arr)]”语句,去掉数组中的重复元素,返回去重后的新数组;2、利用sort()对去重数组进行排序,语法“去重数组.sort()”。

本篇文章给大家带来了关于JavaScript的相关知识,其中主要介绍了关于Symbol类型、隐藏属性及全局注册表的相关问题,包括了Symbol类型的描述、Symbol不会隐式转字符串等问题,下面一起来看一下,希望对大家有帮助。

怎么制作文字轮播与图片轮播?大家第一想到的是不是利用js,其实利用纯CSS也能实现文字轮播与图片轮播,下面来看看实现方法,希望对大家有所帮助!

本篇文章给大家带来了关于JavaScript的相关知识,其中主要介绍了关于对象的构造函数和new操作符,构造函数是所有对象的成员方法中,最早被调用的那个,下面一起来看一下吧,希望对大家有帮助。

方法:1、利用“点击元素对象.unbind("click");”方法,该方法可以移除被选元素的事件处理程序;2、利用“点击元素对象.off("click");”方法,该方法可以移除通过on()方法添加的事件处理程序。

本篇文章给大家带来了关于JavaScript的相关知识,其中主要介绍了关于面向对象的相关问题,包括了属性描述符、数据描述符、存取描述符等等内容,下面一起来看一下,希望对大家有帮助。

本篇文章给大家带来了关于JavaScript的相关知识,其中主要介绍了关于BOM操作的相关问题,包括了window对象的常见事件、JavaScript执行机制等等相关内容,下面一起来看一下,希望对大家有帮助。

foreach不是es6的方法。foreach是es3中一个遍历数组的方法,可以调用数组的每个元素,并将元素传给回调函数进行处理,语法“array.forEach(function(当前元素,索引,数组){...})”;该方法不处理空数组。


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

SublimeText3 Chinese version
Chinese version, very easy to use

mPDF
mPDF is a PHP library that can generate PDF files from UTF-8 encoded HTML. The original author, Ian Back, wrote mPDF to output PDF files "on the fly" from his website and handle different languages. It is slower than original scripts like HTML2FPDF and produces larger files when using Unicode fonts, but supports CSS styles etc. and has a lot of enhancements. Supports almost all languages, including RTL (Arabic and Hebrew) and CJK (Chinese, Japanese and Korean). Supports nested block-level elements (such as P, DIV),

Notepad++7.3.1
Easy-to-use and free code editor

DVWA
Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is very vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, to help web developers better understand the process of securing web applications, and to help teachers/students teach/learn in a classroom environment Web application security. The goal of DVWA is to practice some of the most common web vulnerabilities through a simple and straightforward interface, with varying degrees of difficulty. Please note that this software

SecLists
SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.
