JIYIK CN >

Current Location:Home > Learning >

All

Doubly Linked List

Publish Date:2025/03/18 Author:JIYIK Category:ALGORITHM

Doubly linked list is a linear data structure. It is a collection of objects defined as nodes. But unlike a linked list, the node has two pointers, one is the previous pointer and the other is the next pointer. Just like the linked list nod...

Full

Circular Linked List

Publish Date:2025/03/18 Author:JIYIK Category:ALGORITHM

A circular linked list is a data structure that is slightly more complex than a linked list. It is a linked list where all the nodes are connected in a loop and form a chain. The last node does not have a NULL . Instead, it stores the addre...

Full

Circular Doubly Linked List

Publish Date:2025/03/18 Author:JIYIK Category:ALGORITHM

A circular doubly linked list is a combination of a circular linked list and a doubly linked list. Its two nodes are connected by a previous and next pointer. The next pointer of the last node points to the first node, and the previous poin...

Full

Binary Tree Traversal

Publish Date:2025/03/18 Author:JIYIK Category:ALGORITHM

A binary tree is a non-linear data structure. It is called a binary tree because each node has at most two children. These children are called left and right children. It can also be interpreted as an undirected graph where the topmost node...

Full

Binary Search Tree

Publish Date:2025/03/18 Author:JIYIK Category:ALGORITHM

A binary search tree (BST) is an ordered binary tree data structure based on nodes. A node has a value and two child nodes (a binary tree has at most two child nodes) connected to each other. A node has a value and two child nodes (a binary...

Full

Iterative insertion into a binary search tree

Publish Date:2025/03/18 Author:JIYIK Category:ALGORITHM

In the previous article Binary Search Tree , we discussed the recursive method to insert a node in BST. In this article, we will discuss the iterative method to insert a node in BST. It is better than the recursive method because the iterat...

Full

Binary Search Tree Check

Publish Date:2025/03/18 Author:JIYIK Category:ALGORITHM

A binary tree is a non-linear data structure. It is called a binary tree because each node has at most two children. These children are called left children and right children. For a binary tree to be a BST, it must satisfy the following pr...

Full

Binary Search Tree Deletion

Publish Date:2025/03/18 Author:JIYIK Category:ALGORITHM

In the article Binary Search Trees: Searching and Inserting , we discussed how to insert an element into a binary search tree and how to search for a value in a binary search tree. In this article, we will discuss how to delete a node from...

Full

In-order descendants in a binary search tree

Publish Date:2025/03/18 Author:JIYIK Category:ALGORITHM

The in-order descendant of a binary tree is the next node in the in-order traversal of the binary tree. So, for the last node in the tree, it is NULL . Since the in-order traversal of a binary search tree is a sorted array. The node with th...

Full

Convert a binary tree to a binary search tree

Publish Date:2025/03/18 Author:JIYIK Category:ALGORITHM

A binary tree is a non-linear data structure. It is called a binary tree because each node has at most two children. These children are called left and right children. It can also be interpreted as an undirected graph where the topmost node...

Full

How Nginx and uWISG servers work together

Publish Date:2025/03/17 Author:JIYIK Category:NETWORK

Nginx and uWISG are two commonly used server software that can work together to provide more stable and efficient network services. This article will introduce in detail the working principle of Nginx and uWISG, and how to configure them to achieve op...

Full

Introduction to Python Network Programming

Publish Date:2025/03/17 Author:JIYIK Category:NETWORK

This tutorial will introduce sockets in Python and how to use the socket module to build HTTP servers and clients in Python. It will also cover Tornado, a Python networking library that is ideal for long polling, WebSockets, and other networking scena...

Full

How to find the IP address of the local host in Java

Publish Date:2025/03/17 Author:JIYIK Category:NETWORK

How to find the IP address of the local host in Java

The Java Networking API provides a way to find the local host IP address from a Java program using the java.net InetAddress class. It is rare that you need the local host IP address in a Java program. Most of the time, I use the Unix command to find t...

Full

Apache's AllowOverride All doesn't do what you think

Publish Date:2025/03/17 Author:JIYIK Category:NETWORK

I just had to set up an Apache server for a school project. Since I like to use .htaccess files to set rewrite rules and fiddle with some other options, I had to load some extra modules in addition to the standard batch processing. Using phpin...

Full

The Penetration Tester's Guide to Cross-Site Scripting (XSS)

Publish Date:2025/03/17 Author:JIYIK Category:NETWORK

The Penetration Tester's Guide to Cross-Site Scripting (XSS)

A cross-site scripting (XSS) attack is a type of injection where a malicious script is injected into an otherwise benign and trusted website. It occurs when an attacker uses a web application to send malicious code (usually in the form of a browser-si...

Full

Scan to Read All Tech Tutorials

Social Media
  • https://www.github.com/onmpw
  • qq:1244347461

Hottest

Tags

Scan the Code
Easier Access Tutorial