How to use Java to implement the binary search tree algorithm
The binary search tree (Binary Search Tree, referred to as BST) is a commonly used data structure that can efficiently Implement operations such as insertion, deletion and search. This article will introduce how to use Java to implement a binary search tree and provide corresponding code examples.
1. Definition of binary search tree
Binary search tree is an ordered tree with the following characteristics:
- Each node has a Unique key value.
- The key value of the left subtree is smaller than the key value of the node, and the key value of the right subtree is greater than the key value of the node.
- The left subtree and right subtree are also binary search trees.
2. Implement the node class of the binary search tree
First, we define a node class of the binary search tree, including the key value and the references of the left and right child nodes. The code is as follows:
class Node { int data; Node left, right; public Node(int item) { data = item; left = right = null; } }
In this node class, we save the key value of the node through the data
field, and the left
and right
fields are saved respectively. References to left and right child nodes.
3. Implement the insertion operation of the binary search tree
Next, we implement the insertion operation of the binary search tree. The insertion operation determines the insertion position of the node by comparing the key value size of the node. If the key value is smaller than the current node, it is inserted into the left subtree, otherwise it is inserted into the right subtree. The code is as follows:
class BinarySearchTree { Node root; // 插入操作 public void insert(int key) { root = insertRec(root, key); } private Node insertRec(Node root, int key) { // 如果树为空,创建一个新的节点 if (root == null) { root = new Node(key); return root; } // 否则,递归地插入节点到左子树或右子树 if (key < root.data) root.left = insertRec(root.left, key); else if (key > root.data) root.right = insertRec(root.right, key); return root; } }
In the insertion operation, we first determine whether the tree is empty. If it is empty, create a new node as the root node. Otherwise, recursively insert into the left subtree or right subtree by comparing the size relationship between the key value and the current node.
4. Implement the search operation of the binary search tree
The search operation of the binary search tree is relatively simple. It compares the size relationship between the key value and the node step by step until a match or encounter is found. until empty nodes. The code is as follows:
class BinarySearchTree { ... // 查找操作 public boolean contains(int key) { return containsRec(root, key); } private boolean containsRec(Node root, int key) { // 树为空或者找到匹配节点 if (root == null || root.data == key) return (root != null); // 比较键值与当前节点 if (key < root.data) return containsRec(root.left, key); else return containsRec(root.right, key); } }
In the search operation, we first determine whether the tree is empty or whether the current node matches. Returns true if there is a match, otherwise recursively searches the left or right subtree by comparing the size of the key value with the current node.
5. Code for testing the binary search tree
Finally, we write code to test the binary search tree we implemented. The code is as follows:
public class Main { public static void main(String[] args) { BinarySearchTree tree = new BinarySearchTree(); tree.insert(50); tree.insert(30); tree.insert(20); tree.insert(40); tree.insert(70); tree.insert(60); tree.insert(80); System.out.println(tree.contains(30)); System.out.println(tree.contains(90)); } }
The running result is:
true false
Here we insert some nodes into the tree by calling the insert operation. Then, we call the find operation to find nodes with key values 30 and 90 respectively. The result returned is whether the insertion operation was successful.
Through the above steps, we successfully implemented the binary search tree algorithm using Java and implemented the insertion and search operations. In practical applications, binary search trees can also support functions such as deletion operations, pre-order, in-order and post-order traversal. Readers can further expand the implementation according to specific needs.
The above is the detailed content of How to implement binary search tree algorithm using java. For more information, please follow other related articles on the PHP Chinese website!

本篇文章给大家带来了关于java的相关知识,其中主要介绍了关于结构化数据处理开源库SPL的相关问题,下面就一起来看一下java下理想的结构化数据处理类库,希望对大家有帮助。

本篇文章给大家带来了关于java的相关知识,其中主要介绍了关于PriorityQueue优先级队列的相关知识,Java集合框架中提供了PriorityQueue和PriorityBlockingQueue两种类型的优先级队列,PriorityQueue是线程不安全的,PriorityBlockingQueue是线程安全的,下面一起来看一下,希望对大家有帮助。

本篇文章给大家带来了关于java的相关知识,其中主要介绍了关于java锁的相关问题,包括了独占锁、悲观锁、乐观锁、共享锁等等内容,下面一起来看一下,希望对大家有帮助。

本篇文章给大家带来了关于java的相关知识,其中主要介绍了关于多线程的相关问题,包括了线程安装、线程加锁与线程不安全的原因、线程安全的标准类等等内容,希望对大家有帮助。

本篇文章给大家带来了关于Java的相关知识,其中主要介绍了关于关键字中this和super的相关问题,以及他们的一些区别,下面一起来看一下,希望对大家有帮助。

本篇文章给大家带来了关于java的相关知识,其中主要介绍了关于枚举的相关问题,包括了枚举的基本操作、集合类对枚举的支持等等内容,下面一起来看一下,希望对大家有帮助。

封装是一种信息隐藏技术,是指一种将抽象性函式接口的实现细节部分包装、隐藏起来的方法;封装可以被认为是一个保护屏障,防止指定类的代码和数据被外部类定义的代码随机访问。封装可以通过关键字private,protected和public实现。

本篇文章给大家带来了关于java的相关知识,其中主要介绍了关于设计模式的相关问题,主要将装饰器模式的相关内容,指在不改变现有对象结构的情况下,动态地给该对象增加一些职责的模式,希望对大家有帮助。


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

SublimeText3 English version
Recommended: Win version, supports code prompts!

Safe Exam Browser
Safe Exam Browser is a secure browser environment for taking online exams securely. This software turns any computer into a secure workstation. It controls access to any utility and prevents students from using unauthorized resources.

Zend Studio 13.0.1
Powerful PHP integrated development environment

DVWA
Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is very vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, to help web developers better understand the process of securing web applications, and to help teachers/students teach/learn in a classroom environment Web application security. The goal of DVWA is to practice some of the most common web vulnerabilities through a simple and straightforward interface, with varying degrees of difficulty. Please note that this software

mPDF
mPDF is a PHP library that can generate PDF files from UTF-8 encoded HTML. The original author, Ian Back, wrote mPDF to output PDF files "on the fly" from his website and handle different languages. It is slower than original scripts like HTML2FPDF and produces larger files when using Unicode fonts, but supports CSS styles etc. and has a lot of enhancements. Supports almost all languages, including RTL (Arabic and Hebrew) and CJK (Chinese, Japanese and Korean). Supports nested block-level elements (such as P, DIV),
