Skip to content

Commit 31a24d9

Browse files
committed
Merge remote-tracking branch 'origin/rom_to_int_improve' into rom_to_int_improve
2 parents 065efcb + a9c5bae commit 31a24d9

27 files changed

+1186
-58
lines changed

DIRECTORY.md

Lines changed: 21 additions & 0 deletions
Large diffs are not rendered by default.

pom.xml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@
2020
<dependency>
2121
<groupId>org.junit</groupId>
2222
<artifactId>junit-bom</artifactId>
23-
<version>5.11.2</version>
23+
<version>5.11.3</version>
2424
<type>pom</type>
2525
<scope>import</scope>
2626
</dependency>
@@ -31,7 +31,7 @@
3131
<dependency>
3232
<groupId>org.junit.jupiter</groupId>
3333
<artifactId>junit-jupiter</artifactId>
34-
<version>5.11.2</version>
34+
<version>5.11.3</version>
3535
<scope>test</scope>
3636
</dependency>
3737
<dependency>
@@ -51,7 +51,7 @@
5151
<dependency>
5252
<groupId>org.junit.jupiter</groupId>
5353
<artifactId>junit-jupiter-api</artifactId>
54-
<version>5.11.2</version>
54+
<version>5.11.3</version>
5555
<scope>test</scope>
5656
</dependency>
5757
<dependency>
@@ -132,7 +132,7 @@
132132
<plugin>
133133
<groupId>com.github.spotbugs</groupId>
134134
<artifactId>spotbugs-maven-plugin</artifactId>
135-
<version>4.8.6.4</version>
135+
<version>4.8.6.5</version>
136136
<configuration>
137137
<excludeFilterFile>spotbugs-exclude.xml</excludeFilterFile>
138138
<includeTests>true</includeTests>
Lines changed: 71 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,71 @@
1+
package com.thealgorithms.ciphers;
2+
3+
import java.util.HashMap;
4+
import java.util.Map;
5+
6+
/**
7+
* The Baconian Cipher is a substitution cipher where each letter is represented
8+
* by a group of five binary digits (A's and B's). It can also be used to hide
9+
* messages within other texts, making it a simple form of steganography.
10+
* https://en.wikipedia.org/wiki/Bacon%27s_cipher
11+
*
12+
* @author Bennybebo
13+
*/
14+
public class BaconianCipher {
15+
16+
private static final Map<Character, String> BACONIAN_MAP = new HashMap<>();
17+
private static final Map<String, Character> REVERSE_BACONIAN_MAP = new HashMap<>();
18+
19+
static {
20+
// Initialize the Baconian cipher mappings
21+
String[] baconianAlphabet = {"AAAAA", "AAAAB", "AAABA", "AAABB", "AABAA", "AABAB", "AABBA", "AABBB", "ABAAA", "ABAAB", "ABABA", "ABABB", "ABBAA", "ABBAB", "ABBBA", "ABBBB", "BAAAA", "BAAAB", "BAABA", "BAABB", "BABAA", "BABAB", "BABBA", "BABBB", "BBAAA", "BBAAB"};
22+
char letter = 'A';
23+
for (String code : baconianAlphabet) {
24+
BACONIAN_MAP.put(letter, code);
25+
REVERSE_BACONIAN_MAP.put(code, letter);
26+
letter++;
27+
}
28+
29+
// Handle I/J as the same letter
30+
BACONIAN_MAP.put('I', BACONIAN_MAP.get('J'));
31+
REVERSE_BACONIAN_MAP.put(BACONIAN_MAP.get('I'), 'I');
32+
}
33+
34+
/**
35+
* Encrypts the given plaintext using the Baconian cipher.
36+
*
37+
* @param plaintext The plaintext message to encrypt.
38+
* @return The ciphertext as a binary (A/B) sequence.
39+
*/
40+
public String encrypt(String plaintext) {
41+
StringBuilder ciphertext = new StringBuilder();
42+
plaintext = plaintext.toUpperCase().replaceAll("[^A-Z]", ""); // Remove non-letter characters
43+
44+
for (char letter : plaintext.toCharArray()) {
45+
ciphertext.append(BACONIAN_MAP.get(letter));
46+
}
47+
48+
return ciphertext.toString();
49+
}
50+
51+
/**
52+
* Decrypts the given ciphertext encoded in binary (A/B) format using the Baconian cipher.
53+
*
54+
* @param ciphertext The ciphertext to decrypt.
55+
* @return The decrypted plaintext message.
56+
*/
57+
public String decrypt(String ciphertext) {
58+
StringBuilder plaintext = new StringBuilder();
59+
60+
for (int i = 0; i < ciphertext.length(); i += 5) {
61+
String code = ciphertext.substring(i, i + 5);
62+
if (REVERSE_BACONIAN_MAP.containsKey(code)) {
63+
plaintext.append(REVERSE_BACONIAN_MAP.get(code));
64+
} else {
65+
throw new IllegalArgumentException("Invalid Baconian code: " + code);
66+
}
67+
}
68+
69+
return plaintext.toString();
70+
}
71+
}
Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
package com.thealgorithms.ciphers;
2+
3+
import java.math.BigInteger;
4+
5+
public final class DiffieHellman {
6+
7+
private final BigInteger base;
8+
private final BigInteger secret;
9+
private final BigInteger prime;
10+
11+
// Constructor to initialize base, secret, and prime
12+
public DiffieHellman(BigInteger base, BigInteger secret, BigInteger prime) {
13+
// Check for non-null and positive values
14+
if (base == null || secret == null || prime == null || base.signum() <= 0 || secret.signum() <= 0 || prime.signum() <= 0) {
15+
throw new IllegalArgumentException("Base, secret, and prime must be non-null and positive values.");
16+
}
17+
this.base = base;
18+
this.secret = secret;
19+
this.prime = prime;
20+
}
21+
22+
// Method to calculate public value (g^x mod p)
23+
public BigInteger calculatePublicValue() {
24+
// Returns g^x mod p
25+
return base.modPow(secret, prime);
26+
}
27+
28+
// Method to calculate the shared secret key (otherPublic^secret mod p)
29+
public BigInteger calculateSharedSecret(BigInteger otherPublicValue) {
30+
if (otherPublicValue == null || otherPublicValue.signum() <= 0) {
31+
throw new IllegalArgumentException("Other public value must be non-null and positive.");
32+
}
33+
// Returns b^x mod p or a^y mod p
34+
return otherPublicValue.modPow(secret, prime);
35+
}
36+
}
Lines changed: 48 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,48 @@
1+
package com.thealgorithms.ciphers;
2+
3+
public final class MonoAlphabetic {
4+
5+
private MonoAlphabetic() {
6+
throw new UnsupportedOperationException("Utility class");
7+
}
8+
9+
// Encryption method
10+
public static String encrypt(String data, String key) {
11+
if (!data.matches("[A-Z]+")) {
12+
throw new IllegalArgumentException("Input data contains invalid characters. Only uppercase A-Z are allowed.");
13+
}
14+
StringBuilder sb = new StringBuilder();
15+
16+
// Encrypt each character
17+
for (char c : data.toCharArray()) {
18+
int idx = charToPos(c); // Get the index of the character
19+
sb.append(key.charAt(idx)); // Map to the corresponding character in the key
20+
}
21+
return sb.toString();
22+
}
23+
24+
// Decryption method
25+
public static String decrypt(String data, String key) {
26+
StringBuilder sb = new StringBuilder();
27+
28+
// Decrypt each character
29+
for (char c : data.toCharArray()) {
30+
int idx = key.indexOf(c); // Find the index of the character in the key
31+
if (idx == -1) {
32+
throw new IllegalArgumentException("Input data contains invalid characters.");
33+
}
34+
sb.append(posToChar(idx)); // Convert the index back to the original character
35+
}
36+
return sb.toString();
37+
}
38+
39+
// Helper method: Convert a character to its position in the alphabet
40+
private static int charToPos(char c) {
41+
return c - 'A'; // Subtract 'A' to get position (0 for A, 1 for B, etc.)
42+
}
43+
44+
// Helper method: Convert a position in the alphabet to a character
45+
private static char posToChar(int pos) {
46+
return (char) (pos + 'A'); // Add 'A' to convert position back to character
47+
}
48+
}

src/main/java/com/thealgorithms/dynamicprogramming/RodCutting.java

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,10 @@ public static int cutRod(int[] price, int n) {
2222
if (price == null || price.length == 0) {
2323
throw new IllegalArgumentException("Price array cannot be null or empty.");
2424
}
25+
if (n < 0) {
26+
throw new IllegalArgumentException("Rod length cannot be negative.");
27+
}
28+
2529
// Create an array to store the maximum obtainable values for each rod length.
2630
int[] val = new int[n + 1];
2731
val[0] = 0;
Lines changed: 84 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,84 @@
1+
import java.util.ArrayList;
2+
import java.util.Arrays;
3+
import java.util.HashMap;
4+
import java.util.List;
5+
import java.util.Stack;
6+
7+
/**
8+
* Finds the strongly connected components in a directed graph.
9+
*
10+
* @param adjList The adjacency list representation of the graph.
11+
* @param n The number of nodes in the graph.
12+
* @return The number of strongly connected components.
13+
*/
14+
public class StronglyConnectedComponentOptimized {
15+
16+
public void btrack(HashMap<Integer, List<Integer>> adjList, int[] visited, Stack<Integer> dfsCallsNodes, int currentNode) {
17+
visited[currentNode] = 1;
18+
List<Integer> neighbors = adjList.get(currentNode);
19+
// Check for null before iterating
20+
if (neighbors != null) {
21+
for (int neighbor : neighbors) {
22+
if (visited[neighbor] == -1) {
23+
btrack(adjList, visited, dfsCallsNodes, neighbor);
24+
}
25+
}
26+
}
27+
dfsCallsNodes.add(currentNode);
28+
}
29+
30+
public void btrack2(HashMap<Integer, List<Integer>> adjRevList, int[] visited, int currentNode, List<Integer> newScc) {
31+
visited[currentNode] = 1;
32+
newScc.add(currentNode);
33+
List<Integer> neighbors = adjRevList.get(currentNode);
34+
// Check for null before iterating
35+
if (neighbors != null) {
36+
for (int neighbor : neighbors) {
37+
if (visited[neighbor] == -1) {
38+
btrack2(adjRevList, visited, neighbor, newScc);
39+
}
40+
}
41+
}
42+
}
43+
44+
public int getOutput(HashMap<Integer, List<Integer>> adjList, int n) {
45+
int[] visited = new int[n];
46+
Arrays.fill(visited, -1);
47+
Stack<Integer> dfsCallsNodes = new Stack<>();
48+
49+
for (int i = 0; i < n; i++) {
50+
if (visited[i] == -1) {
51+
btrack(adjList, visited, dfsCallsNodes, i);
52+
}
53+
}
54+
55+
HashMap<Integer, List<Integer>> adjRevList = new HashMap<>();
56+
for (int i = 0; i < n; i++) {
57+
adjRevList.put(i, new ArrayList<>());
58+
}
59+
60+
for (int i = 0; i < n; i++) {
61+
List<Integer> neighbors = adjList.get(i);
62+
// Check for null before iterating
63+
if (neighbors != null) {
64+
for (int neighbor : neighbors) {
65+
adjRevList.get(neighbor).add(i);
66+
}
67+
}
68+
}
69+
70+
Arrays.fill(visited, -1);
71+
int stronglyConnectedComponents = 0;
72+
73+
while (!dfsCallsNodes.isEmpty()) {
74+
int node = dfsCallsNodes.pop();
75+
if (visited[node] == -1) {
76+
List<Integer> newScc = new ArrayList<>();
77+
btrack2(adjRevList, visited, node, newScc);
78+
stronglyConnectedComponents++;
79+
}
80+
}
81+
82+
return stronglyConnectedComponents;
83+
}
84+
}

src/main/java/com/thealgorithms/maths/GCD.java

Lines changed: 17 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,23 @@
11
package com.thealgorithms.maths;
22

33
/**
4-
* This is Euclid's algorithm, used to find the greatest common
5-
* denominator Override function name gcd
4+
* This class provides methods to compute the Greatest Common Divisor (GCD) of two or more integers.
65
*
6+
* The Greatest Common Divisor (GCD) of two or more integers is the largest positive integer that divides each of the integers without leaving a remainder.
7+
*
8+
* The GCD can be computed using the Euclidean algorithm, which is based on the principle that the GCD of two numbers also divides their difference.
9+
*
10+
* For more information, refer to the
11+
* <a href="https://en.wikipedia.org/wiki/Greatest_common_divisor">Greatest Common Divisor</a> Wikipedia page.
12+
*
13+
* <b>Example usage:</b>
14+
* <pre>
15+
* int result1 = GCD.gcd(48, 18);
16+
* System.out.println("GCD of 48 and 18: " + result1); // Output: 6
17+
*
18+
* int result2 = GCD.gcd(48, 18, 30);
19+
* System.out.println("GCD of 48, 18, and 30: " + result2); // Output: 6
20+
* </pre>
721
* @author Oskar Enmalm 3/10/17
822
*/
923
public final class GCD {
@@ -40,20 +54,12 @@ public static int gcd(int num1, int num2) {
4054
* @param numbers the input array
4155
* @return gcd of all of the numbers in the input array
4256
*/
43-
public static int gcd(int[] numbers) {
57+
public static int gcd(int... numbers) {
4458
int result = 0;
4559
for (final var number : numbers) {
4660
result = gcd(result, number);
4761
}
4862

4963
return result;
5064
}
51-
52-
public static void main(String[] args) {
53-
int[] myIntArray = {4, 16, 32};
54-
55-
// call gcd function (input array)
56-
System.out.println(gcd(myIntArray)); // => 4
57-
System.out.printf("gcd(40,24)=%d gcd(24,40)=%d%n", gcd(40, 24), gcd(24, 40)); // => 8
58-
}
5965
}

0 commit comments

Comments
 (0)