Skip to main content

Day 15: Decode String: stack - leetcode - Python3

 Given an encoded string, return its decoded string.

The encoding rule is: k[encoded_string], where the encoded_string inside the square brackets is being repeated exactly k times. Note that k is guaranteed to be a positive integer.

You may assume that the input string is always valid; there are no extra white spaces, square brackets are well-formed, etc. Furthermore, you may assume that the original data does not contain any digits and that digits are only for those repeat numbers, k. For example, there will not be input like 3a or 2[4].

The test cases are generated so that the length of the output will never exceed 105.

Example 1:

Input: s = "3[a]2[bc]"
Output: "aaabcbc"

Example 2:

Input: s = "3[a2[c]]"
Output: "accaccacc"

Example 3:

Input: s = "2[abc]3[cd]ef"
Output: "abcabccdcdcdef"

Constraints:

  • 1 <= s.length <= 30
  • s consists of lowercase English letters, digits, and square brackets '[]'.
  • s is guaranteed to be a valid input.
  • All the integers in s are in the range [1, 300].
SOLUTION:
class Solution:
    def decodeString(self, s: str) -> str:
        stack: List[int] = []

        for i in s:
            if i !=  "]":
                stack.append(i)
            else:
                string: str = ""
                while stack[-1] != "[":
                    string = stack.pop() + string

                stack.pop() #pop "["
               
                k: str = ""
                while stack and stack[-1].isdigit():
                    k = stack.pop() + k

                stack.append(int(k) * string)

        return "".join(stack)


Time Complexity: O(n)

Space Complexity: O(n)


How it works:

  1. Initialize an empty stack and iterate over each character i in the input string s.

  2. If the current character i is not equal to "]", it means it is a character that needs to be processed. In this case, the character is pushed onto the stack.

  3. If the current character i is equal to "]", it indicates that a substring needs to be repeated. The code enters an inner loop.

  4. Inside the inner loop, the code pops characters from the stack until it encounters the corresponding opening bracket "[". During this process, each character is concatenated with the string variable in reverse order. This step extracts the substring that needs to be repeated.

  5. After the inner loop, the opening bracket "[" is popped from the stack to remove it.

  6. Next, another loop is executed while there are characters left in the stack and the top character is a digit. This loop extracts the number of times the substring should be repeated. Each digit character is concatenated with the k variable in reverse order.

  7. After the second loop, the code calculates the result of the repetition by multiplying the integer value of k with the string substring.

  8. The resulting repeated substring is pushed back onto the stack.

  9. Finally, after iterating through all the characters in the input string s, the code joins the elements in the stack to form a single string and returns it as the decoded result.


Comments

Popular posts from this blog

Bug Boundy Methodology, Tools & Resources

Start by defining a clear objective, such as exploiting a remote code execution (RCE) vulnerability or bypassing authentication on your target. Then, consider how you can achieve this goal using various attack vectors like XSS, SSRF, or others - these are simply tools to help you reach your objective. Use the target as how a normal user would, while browsing keep these questions in mind: 1)How does the app pass data? 2)How/where does the app talk about users? 3)Does the app have multi-tenancy or user levels? 4)Does the app have a unique threat model? 5)Has there been past security research & vulnerabilities? 6)How does the app handle XSS, CSRF, and code injection?

Install & set up mitmweb or mitmproxy in Linux

Step 1: Go to the mitmproxy page and download the binaries. Step 2: Install the downloaded tar file with the command " tar -xzf <filename>.tar.gz " Step 3: In the FoxyProxy add the proxy 127.0.0.1:8080  and turn it on. Step 4 : In the terminal run command " ./mitmweb " Step 5: Go to the page  http://mitm.it/   and download the mitmproxy's Certificate. Step 6: If you downloaded the certificate for Firefox, then go to " settings -> Privacy & Security -> Click View Certificates -> Click  Import ", then import the certificate.  Step 7: Now you are ready to capture the web traffic. Step 8 : In terminal run " ./mitmweb"

Making CHIP-8 emulator in C

  Chip8 doc link | Components | Opcode Table GitHub - AdithyakrishnaV/Chip8_Emulator--Interpreter Contribute to AdithyakrishnaV/Chip8_Emulator--Interpreter development by creating an account on GitHub. github.com CHIP-8 programs are binary files, and your emulator must read them and operate on the bytes. You will also need a way to draw graphics to the screen and read keypresses. Many graphical libraries can do this for you or use something like SDL directly. CHIP-8 components Display 64 pixels wide and 32 pixels tall. Each pixel is a boolean value, or a bit; can be on or off (“off” pixel was just black, and “on” was white). We’ll use SDL for rendering: SDL initialization Not initialize:- returns -1  Error message is stored in SDL_GetError Initializing SDL if (SDL_Init(SDL_INIT_VIDEO)!= 0 ){ printf ( "SDL not initialized,%s\n" , SDL_GetError); exit (- 1 ); } Initialize display SDL_Window * window = SDL_CreateWindow ( "chip8" , SDL_WINDOWPOS_CENTERED , SDL_...