Very simple hashing is:
http://research.cs.vt.edu/AVresearch/hashing/strings.php
Advanced hashing is:
http://www.cse.yorku.ca/~oz/hash.html
https://stackoverflow.com/questions/7666509/hash-function-for-string
http://research.cs.vt.edu/AVresearch/hashing/strings.php
int h(String x, int M) { char ch[]; ch = x.toCharArray(); int xlength = x.length(); int i, sum; for (sum=0, i=0; i < x.length(); i++) sum += ch[i]; return sum % M; }
Advanced hashing is:
http://www.cse.yorku.ca/~oz/hash.html
https://stackoverflow.com/questions/7666509/hash-function-for-string
djb2
this algorithm (k=33) was first reported by dan bernstein many years ago in comp.lang.c. another version of this algorithm (now favored by bernstein) uses xor: hash(i) = hash(i - 1) * 33 ^ str[i]; the magic of number 33 (why it works better than many other constants, prime or not) has never been adequately explained.unsigned long hash(unsigned char *str) { unsigned long hash = 5381; int c; while (c = *str++) hash = ((hash << 5) + hash) + c; /* hash * 33 + c */ return hash; }
hacker rank problem:A kidnapper wrote a ransom note but is worried it will be traced back to him. He found a magazine and wants to know if he can cut out whole words from it and use them to create an untraceable replica of his ransom note. The words in his note are case-sensitive and he must use whole words available in the magazine, meaning he cannotuse substrings or concatenation to create the words he needs.Given the words in the magazine and the words in the ransom note, printYes
if he can replicate his ransom note exactly using whole words from the magazine; otherwise, printNo
.Input FormatThe first line contains two space-separated integers describing the respective values of (the number of words in the magazine) and (the number of words in the ransom note). The second line contains space-separated strings denoting the words present in the magazine. The third line contains space-separated strings denoting the words present in the ransom note.Constraints
- .
- Each word consists of English alphabetic letters (i.e., to and to ).
- The words in the note and magazine are case-sensitive.
Output FormatYes
if he can use the magazine to create an untraceable replica of his ransom note; otherwise, printNo
.Sample Input 06 4 give me one grand today night give one grand todaySample Output 0Yes
Sample Input 16 5 two times three is not four two times two is fourSample Output 1No
Explanation 1
No comments:
Post a Comment