search
HomeJavajavaTutorialWhat are the common basic data structures in Java?

Stack:

stack, also known as stack, it is a linear table with limited operations. Its restriction is that only insertion and deletion operations are allowed at one end of the table, and are not allowed at Add, search, delete, etc. operations can be performed at any other location.

Simply speaking, using a set with this structure, the access to elements has the following characteristics

1. First in, last out.

2. The entrance and exit of the stack are both at the top of the stack.

Pushing onto the stack: means storing elements at the top of the stack. Elements already in the stack move one position at a time toward the bottom of the stack.

Popping the stack: taking the element, taking out the element at the top of the stack, and moving the existing elements in the stack one position toward the top of the stack.

Queue:

queue, referred to as queue. Like the stack, it is also a linear table with limited operations. The restriction is that insertion is only allowed at one end of the table. And delete at the other end of the table.

Simply put, using a set with this structure, the access to elements has the following characteristics:

1. First in, first out

2. Queue entrance and exit Each occupies one side, for example, the left side is the entrance and the right side is the exit

Array:

Array, is an ordered sequence of elements, and the array is in memory Create a continuous space at one end and store elements in this space. You can quickly find the corresponding data through the index.

Using this method to store data has the following characteristics:

1. It is fast to find elements, and the elements at the specified position can be quickly accessed through the index.

2. Adding and deleting elements is slow. To add an element at a specified index position, you need to create a new array, store the specified new element at the specified index position, and then copy the original array elements to the new array according to the index. To delete an element at the corresponding index position

, you need to create a new array and copy the original array elements to the position of the new array corresponding to the index according to the index. The elements at the specified index position in the original array are not copied to the new array.

Linked list:

Linked List consists of a series of nodes, which can be dynamically generated at runtime. Each node consists of two parts: one is the data field that stores data elements, and the other is the pointer field that stores the address of the next node. Linked lists are divided into one-way linked lists and doubly linked lists. A doubly linked list has a reference to the previous node and a pointer to the next node, while a one-way linked list only has a pointer to the next node.

Simply put, using this collection of data structures, the data storage has the following characteristics:

  • Multiple nodes are connected through addresses. .

  • The query is slow. If you want to find an element, you need to search backwards through the connected nodes.

  • Add and delete quickly, you only need to modify the address connecting the next element.

Red-black tree:

Binary tree: an ordered tree with no more than 2 nodes per node

Simple understanding, a binary tree is a tree where each node A tree structure with at most two subtrees. The top node is called the root node, and the two sides are called the left subtree and the right subtree.

The red-black tree itself is a binary search number. After inserting the node, the number is still a binary search number, which means that the key values ​​of the number are still in order.

Constraints of red-black trees:

  • Nodes can be red or black

  • The root node is black

  • The leaf nodes are black

  • The child nodes of each red node are black

  • The number of black nodes on all paths from any node to each leaf node is the same

##Characteristics of red-black trees:

Special speed It is fast and approaches a balanced tree. The minimum and maximum number of times to find leaf elements is no more than twice.

The above is the detailed content of What are the common basic data structures in Java?. For more information, please follow other related articles on the PHP Chinese website!

Statement
This article is reproduced at:亿速云. If there is any infringement, please contact admin@php.cn delete
带你搞懂Java结构化数据处理开源库SPL带你搞懂Java结构化数据处理开源库SPLMay 24, 2022 pm 01:34 PM

本篇文章给大家带来了关于java的相关知识,其中主要介绍了关于结构化数据处理开源库SPL的相关问题,下面就一起来看一下java下理想的结构化数据处理类库,希望对大家有帮助。

Java集合框架之PriorityQueue优先级队列Java集合框架之PriorityQueue优先级队列Jun 09, 2022 am 11:47 AM

本篇文章给大家带来了关于java的相关知识,其中主要介绍了关于PriorityQueue优先级队列的相关知识,Java集合框架中提供了PriorityQueue和PriorityBlockingQueue两种类型的优先级队列,PriorityQueue是线程不安全的,PriorityBlockingQueue是线程安全的,下面一起来看一下,希望对大家有帮助。

完全掌握Java锁(图文解析)完全掌握Java锁(图文解析)Jun 14, 2022 am 11:47 AM

本篇文章给大家带来了关于java的相关知识,其中主要介绍了关于java锁的相关问题,包括了独占锁、悲观锁、乐观锁、共享锁等等内容,下面一起来看一下,希望对大家有帮助。

一起聊聊Java多线程之线程安全问题一起聊聊Java多线程之线程安全问题Apr 21, 2022 pm 06:17 PM

本篇文章给大家带来了关于java的相关知识,其中主要介绍了关于多线程的相关问题,包括了线程安装、线程加锁与线程不安全的原因、线程安全的标准类等等内容,希望对大家有帮助。

详细解析Java的this和super关键字详细解析Java的this和super关键字Apr 30, 2022 am 09:00 AM

本篇文章给大家带来了关于Java的相关知识,其中主要介绍了关于关键字中this和super的相关问题,以及他们的一些区别,下面一起来看一下,希望对大家有帮助。

Java基础归纳之枚举Java基础归纳之枚举May 26, 2022 am 11:50 AM

本篇文章给大家带来了关于java的相关知识,其中主要介绍了关于枚举的相关问题,包括了枚举的基本操作、集合类对枚举的支持等等内容,下面一起来看一下,希望对大家有帮助。

java中封装是什么java中封装是什么May 16, 2019 pm 06:08 PM

封装是一种信息隐藏技术,是指一种将抽象性函式接口的实现细节部分包装、隐藏起来的方法;封装可以被认为是一个保护屏障,防止指定类的代码和数据被外部类定义的代码随机访问。封装可以通过关键字private,protected和public实现。

归纳整理JAVA装饰器模式(实例详解)归纳整理JAVA装饰器模式(实例详解)May 05, 2022 pm 06:48 PM

本篇文章给大家带来了关于java的相关知识,其中主要介绍了关于设计模式的相关问题,主要将装饰器模式的相关内容,指在不改变现有对象结构的情况下,动态地给该对象增加一些职责的模式,希望对大家有帮助。

See all articles

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Article

Repo: How To Revive Teammates
1 months agoBy尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. Energy Crystals Explained and What They Do (Yellow Crystal)
2 weeks agoBy尊渡假赌尊渡假赌尊渡假赌
Hello Kitty Island Adventure: How To Get Giant Seeds
1 months agoBy尊渡假赌尊渡假赌尊渡假赌

Hot Tools

SublimeText3 English version

SublimeText3 English version

Recommended: Win version, supports code prompts!

Safe Exam Browser

Safe Exam Browser

Safe Exam Browser is a secure browser environment for taking online exams securely. This software turns any computer into a secure workstation. It controls access to any utility and prevents students from using unauthorized resources.

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

DVWA

DVWA

Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is very vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, to help web developers better understand the process of securing web applications, and to help teachers/students teach/learn in a classroom environment Web application security. The goal of DVWA is to practice some of the most common web vulnerabilities through a simple and straightforward interface, with varying degrees of difficulty. Please note that this software

mPDF

mPDF

mPDF is a PHP library that can generate PDF files from UTF-8 encoded HTML. The original author, Ian Back, wrote mPDF to output PDF files "on the fly" from his website and handle different languages. It is slower than original scripts like HTML2FPDF and produces larger files when using Unicode fonts, but supports CSS styles etc. and has a lot of enhancements. Supports almost all languages, including RTL (Arabic and Hebrew) and CJK (Chinese, Japanese and Korean). Supports nested block-level elements (such as P, DIV),