Tagged articles
619 articles
Page 1 of 7
Java Tech Enthusiast
Java Tech Enthusiast
Apr 19, 2026 · Interview Experience

Counting Boomerangs Efficiently: Hash‑Map Solution for LeetCode 447

This article explains how to count all boomerang tuples in a set of distinct points by using a hash‑map to store distance frequencies for each anchor point, achieving O(n²) time without costly square‑root calculations and providing Java, C++, and Python implementations.

BoomerangHashMapLeetCode
0 likes · 7 min read
Counting Boomerangs Efficiently: Hash‑Map Solution for LeetCode 447
Machine Learning Algorithms & Natural Language Processing
Machine Learning Algorithms & Natural Language Processing
Apr 10, 2026 · Artificial Intelligence

The Viral SBTI Test: Inside Its 15‑Dimensional Vector Matching Algorithm

The article dissects the viral SBTI personality test, revealing that its results are generated by a hybrid human‑AI workflow that encodes answers into a 15‑dimensional vector, bins scores, and matches them against predefined templates using simple distance calculations and special fallback rules.

15-dimensionalAISBTI
0 likes · 11 min read
The Viral SBTI Test: Inside Its 15‑Dimensional Vector Matching Algorithm
Java Tech Enthusiast
Java Tech Enthusiast
Feb 28, 2026 · Fundamentals

Efficient Java Solution to Count Digit 1 Occurrences from 1 to n

The article first reflects on the importance of quick reaction and solid fundamentals for new developers, then presents an efficient Java implementation that counts how many times the digit 1 appears in the range 1 to n using a digit‑by‑digit analysis.

Digit Countingalgorithminterview
0 likes · 5 min read
Efficient Java Solution to Count Digit 1 Occurrences from 1 to n
Java Tech Enthusiast
Java Tech Enthusiast
Feb 8, 2026 · Fundamentals

Detecting Powers of Two in Java: Bitwise Tricks and Edge Cases

The author shares a workplace frustration about unfair performance metrics, then illustrates how a hidden 1024‑byte boundary bug led to a discussion of the classic “power‑of‑two” problem, providing clear bit‑wise logic, edge‑case handling, and ready‑to‑run Java code for detecting powers of two.

Power of Twoalgorithmbit manipulation
0 likes · 6 min read
Detecting Powers of Two in Java: Bitwise Tricks and Edge Cases
Java Tech Enthusiast
Java Tech Enthusiast
Jan 31, 2026 · Interview Experience

How to Remove the Most Edges While Keeping a Graph Fully Traversable for Alice and Bob

Given an undirected graph with three edge types—Alice‑only, Bob‑only, and shared—the task is to delete the maximum number of edges while still allowing both Alice and Bob to reach every node; the solution uses a two‑union‑find strategy, processes shared edges first, then exclusive ones, and returns the count or -1.

LeetCodealgorithmedge removal
0 likes · 9 min read
How to Remove the Most Edges While Keeping a Graph Fully Traversable for Alice and Bob
Code Wrench
Code Wrench
Jan 23, 2026 · Backend Development

Mastering Task Prioritization in Go: Build a Robust Priority Queue

This article explains why simple FIFO task handling in Go services can drown critical work, introduces priority queues as the algorithmic solution, and provides a complete, thread‑safe implementation with practical examples and common pitfalls.

BackendHeapalgorithm
0 likes · 7 min read
Mastering Task Prioritization in Go: Build a Robust Priority Queue
Tencent Advertising Technology
Tencent Advertising Technology
Jan 22, 2026 · Artificial Intelligence

How Tencent’s Bidding Algorithms Evolved from GMPC to GRB: A Deep Dive into Generative RL for Ads

The article reviews the 2025 evolution of Tencent advertising’s bidding system—from the second‑generation GMPC control algorithm through the third‑generation MRB reinforcement‑learning model to the fourth‑generation generative RL GRB—detailing architectural upgrades, multi‑channel modeling, training pipelines, and experimental gains, and outlines the 2026 AI‑agent roadmap.

AdvertisingGenerative ModelsOnline Learning
0 likes · 15 min read
How Tencent’s Bidding Algorithms Evolved from GMPC to GRB: A Deep Dive into Generative RL for Ads
Code Wrench
Code Wrench
Jan 20, 2026 · Backend Development

Mastering API Rate Limiting in Go: Practical Algorithms and Implementation

This article walks through real‑world Go rate‑limiting strategies—from naive checks to fixed, sliding, and token‑bucket algorithms—explaining their pitfalls, implementation details, performance trade‑offs, and practical tips for choosing and deploying the right solution in production services.

BackendGolangalgorithm
0 likes · 10 min read
Mastering API Rate Limiting in Go: Practical Algorithms and Implementation
JD Tech
JD Tech
Jan 16, 2026 · Artificial Intelligence

How JD’s AI Shopping App Redefines E‑Commerce with Intent‑Driven Minimalism

The article examines JD’s AI‑powered shopping app, detailing its chatbot‑style interface, intent‑driven workflow, AI‑enhanced product recommendation, multi‑scenario integration such as travel and dining, and the underlying research on Fast‑Slow thinking and the SA‑GCPO algorithm that powers the experience.

AIChatbotProduct Review
0 likes · 12 min read
How JD’s AI Shopping App Redefines E‑Commerce with Intent‑Driven Minimalism
php Courses
php Courses
Jan 13, 2026 · Backend Development

How to Detect Duplicate Elements in a PHP Array in O(n) Time

This article explains how to determine whether an integer array contains any duplicate values using a PHP solution that leverages an associative map to achieve linear time and space complexity, complete with example inputs, detailed code walkthrough, and complexity analysis.

ArrayPHPalgorithm
0 likes · 4 min read
How to Detect Duplicate Elements in a PHP Array in O(n) Time
Su San Talks Tech
Su San Talks Tech
Dec 30, 2025 · Backend Development

How I Cut Category Tree Load Time from 3 Seconds to 30 Milliseconds

A real‑world performance disaster caused by N+1 queries in a SpringBoot project was solved by replacing recursive database calls with a single batch query, building an in‑memory hash map, and adding multi‑level caching, achieving a 100× speedup and dramatically reducing system load.

N+1SpringBootalgorithm
0 likes · 19 min read
How I Cut Category Tree Load Time from 3 Seconds to 30 Milliseconds
Code Mala Tang
Code Mala Tang
Dec 28, 2025 · Fundamentals

How to Find the Longest Substring Without Repeating Characters in O(n)

This article explains the problem of finding the longest substring without repeating characters, demonstrates a brute‑force O(n³) solution with code, then introduces an optimized sliding‑window approach that runs in linear time O(n), including detailed implementation, complexity analysis, and key insights.

Sliding WindowStringalgorithm
0 likes · 5 min read
How to Find the Longest Substring Without Repeating Characters in O(n)
IT Services Circle
IT Services Circle
Dec 21, 2025 · Fundamentals

How to Shuffle an Array Uniformly in Java: Fisher‑Yates Solution Explained

The article starts with a brief comment on recent layoffs before diving into the classic interview problem of shuffling an integer array uniformly, explaining why naive random swaps fail, detailing the Fisher‑Yates algorithm, and providing a complete Java implementation with key practical tips.

Array ShuffleFisher-YatesLeetCode
0 likes · 7 min read
How to Shuffle an Array Uniformly in Java: Fisher‑Yates Solution Explained
Java Companion
Java Companion
Dec 18, 2025 · Backend Development

Building a High‑Performance Sensitive‑Word Filter with SpringBoot and DFA

This article explains why traditional string‑search and regex methods struggle with large keyword sets, introduces the deterministic finite automaton (DFA) approach using a Trie structure for linear‑time matching, provides full Java implementations, and discusses real‑world applications and advanced optimizations such as double‑array Tries, Aho‑Corasick, and sharding with Bloom filters.

DFASensitiveWordFilterSpringBoot
0 likes · 17 min read
Building a High‑Performance Sensitive‑Word Filter with SpringBoot and DFA
Code Ape Tech Column
Code Ape Tech Column
Nov 20, 2025 · Backend Development

Build a Millisecond‑Scale Sensitive Word Filter with DFA and Trie in Java

This article explains why traditional string matching and regex struggle with large keyword sets, introduces a DFA‑based solution using a Trie tree for linear‑time detection, provides full Java implementations, shows real‑world integration scenarios, and explores advanced optimizations such as double‑array tries, Aho‑Corasick automata, and sharding with Bloom filters.

DFASensitive Word FilteringTrie
0 likes · 17 min read
Build a Millisecond‑Scale Sensitive Word Filter with DFA and Trie in Java
Raymond Ops
Raymond Ops
Nov 17, 2025 · Operations

Master Nginx Load Balancing: Algorithms, Configs, and Real‑World Examples

This article explains how Nginx functions as a load balancer, covering its event‑driven architecture, reverse‑proxy setup, and five common balancing algorithms—round‑robin, least connections, IP hash, weighted round‑robin, and weighted least connections—along with detailed configuration examples and performance metrics.

algorithmload balancingreverse proxy
0 likes · 10 min read
Master Nginx Load Balancing: Algorithms, Configs, and Real‑World Examples
IT Services Circle
IT Services Circle
Oct 8, 2025 · Fundamentals

How a 9th‑Century Mathematician Gave Us the Word “Algorithm”

The article traces the rise and fall of Khwarezm, the life of Al‑Khwarizmi, his pioneering work in algebra that coined the term “algorithm,” the translation movement of the House of Wisdom, and how these medieval breakthroughs shaped modern mathematics and computing.

Al-KhwarizmiAlgebraArabic numerals
0 likes · 7 min read
How a 9th‑Century Mathematician Gave Us the Word “Algorithm”
Deepin Linux
Deepin Linux
Oct 1, 2025 · Fundamentals

Why Deque Beats Vector and List: Inside the Double‑Ended Queue’s Magic

This article explains how the C++ deque combines the random‑access speed of a vector with the constant‑time double‑ended insertions of a list by using a segmented storage architecture, detailing its internal map, iterator mechanics, core operations, performance comparisons, practical use cases, and common pitfalls.

Data Structurealgorithmc++
0 likes · 47 min read
Why Deque Beats Vector and List: Inside the Double‑Ended Queue’s Magic
Python Programming Learning Circle
Python Programming Learning Circle
Sep 26, 2025 · Game Development

How to Build a Python Missile‑Tracking Demo with Pygame – Step‑by‑Step Guide

This article explains a simple Python missile‑tracking algorithm using Pygame, covering the mathematical basis of time‑sliced vector calculations, triangle geometry for direction and distance, and detailed code that handles movement, rotation, and image offset to keep the missile tip aligned with the target.

Game DevelopmentMissile TrackingPygame
0 likes · 10 min read
How to Build a Python Missile‑Tracking Demo with Pygame – Step‑by‑Step Guide
NiuNiu MaTe
NiuNiu MaTe
Sep 22, 2025 · Big Data

How to De‑duplicate 4 Billion QQ Numbers with Only 1 GB RAM

Learn four practical techniques—simple sorting, hashmap deduplication, external merge sort, and bitmap bit‑set optimization—to efficiently remove duplicate QQ numbers from a 40‑billion‑record file while staying within a strict 1 GB memory limit, even handling tighter 100 MB constraints.

Big DataBitmapalgorithm
0 likes · 9 min read
How to De‑duplicate 4 Billion QQ Numbers with Only 1 GB RAM
IT Services Circle
IT Services Circle
Sep 8, 2025 · Fundamentals

How to Count Subarrays with Sum K Using Prefix Sum and HashMap

This article first highlights Ctrip's employee benefits, then presents the LeetCode 560 subarray sum problem with detailed explanations and multi-language implementations using prefix sum and hash map, including Java, C++, Python, and TypeScript solutions, and discusses time and space complexities.

LeetCodePrefix SumPython
0 likes · 6 min read
How to Count Subarrays with Sum K Using Prefix Sum and HashMap
JD Tech Talk
JD Tech Talk
Sep 8, 2025 · Artificial Intelligence

How I Turned a Generic LLM into a Precise E‑Commerce Risk Detector

The article recounts how a risk‑control algorithm engineer progressively refined a generic large language model through four stages of prompt engineering—defining roles, dimensions, structured I/O, business rules, behavior fingerprints, and a dual‑hypothesis decision framework—to transform it into a precise e‑commerce fraud detection expert.

AILLMPrompt engineering
0 likes · 10 min read
How I Turned a Generic LLM into a Precise E‑Commerce Risk Detector
IT Services Circle
IT Services Circle
Aug 29, 2025 · Backend Development

Why Smooth Weighted Round Robin Works: The Math Behind Balanced Load Distribution

This article explains the smooth weighted round robin algorithm, contrasts it with the non‑smooth version, walks through step‑by‑step examples for a 5:1:1 server weight scenario, and provides mathematical proofs of both weight correctness and smoothness, including references to the original source.

Distributed Systemsalgorithmload balancing
0 likes · 15 min read
Why Smooth Weighted Round Robin Works: The Math Behind Balanced Load Distribution
IT Services Circle
IT Services Circle
Aug 25, 2025 · Fundamentals

How to Efficiently Compress Strings in Java: Interview‑Ready Solution

The article critiques absurd interview questions, then presents a practical Java solution for compressing strings by replacing consecutive characters with their counts, explains the algorithm’s O(n) time and O(1) extra space, discusses edge cases like multi‑digit counts and Unicode handling, and offers implementation tips.

String Compressionalgorithminterview question
0 likes · 6 min read
How to Efficiently Compress Strings in Java: Interview‑Ready Solution
Sohu Smart Platform Tech Team
Sohu Smart Platform Tech Team
Aug 9, 2025 · Artificial Intelligence

How SimHash and Cosine Similarity Accelerate Large-Scale Text Deduplication

This article explains why traditional pairwise text comparison is impractical for massive news corpora, introduces cosine similarity and SimHash as efficient deduplication techniques, walks through their mathematical foundations, step‑by‑step implementation details, code examples, and discusses trade‑offs such as accuracy versus speed.

Big DataCosine SimilaritySimHash
0 likes · 12 min read
How SimHash and Cosine Similarity Accelerate Large-Scale Text Deduplication
Python Crawling & Data Mining
Python Crawling & Data Mining
Jul 28, 2025 · Fundamentals

How to Accurately Detect Palindromes in Python: Multiple Approaches Explained

This article walks through a Python community member's question about checking whether a number is a palindrome, presents the original flawed code, and then offers several correct implementations—including a for‑else solution, an all‑function check, and a slicing method—while explaining the underlying logic.

String Manipulationalgorithmfor-else
0 likes · 5 min read
How to Accurately Detect Palindromes in Python: Multiple Approaches Explained
IT Services Circle
IT Services Circle
Jul 20, 2025 · Fundamentals

Master Student Geographic Aggregation in Java with Nested Maps

This article explains how to solve the Student Geographic Information Report problem by defining a Student class, using three‑level nested Java Maps for province‑city‑district grouping, and implementing aggregation and ranking logic to count students per region and identify the city with the most students.

Geographic InformationMAPStudent Data
0 likes · 6 min read
Master Student Geographic Aggregation in Java with Nested Maps
Deepin Linux
Deepin Linux
Jul 15, 2025 · Fundamentals

Mastering LRU Cache: Theory, C++ Implementation, and Interview Strategies

This article explains the core principles of the Least Recently Used (LRU) cache algorithm, details its operation and complexity, provides a complete C++ implementation with line-by-line analysis, showcases test cases, and offers practical interview tips and extensions such as LFU and LRU‑K.

CacheLRUalgorithm
0 likes · 18 min read
Mastering LRU Cache: Theory, C++ Implementation, and Interview Strategies
IT Services Circle
IT Services Circle
Jun 27, 2025 · Fundamentals

How to Solve the Champagne Tower Problem on LeetCode with Linear DP

The article first reflects on ByteDance's expanding English testing policy, then presents LeetCode problem 799 “Champagne Tower”, describing its mechanics and offering a linear‑DP solution with full implementations in Java, C++, Python and TypeScript, along with complexity analysis.

DPLeetCodePython
0 likes · 8 min read
How to Solve the Champagne Tower Problem on LeetCode with Linear DP
Java Web Project
Java Web Project
Jun 25, 2025 · Backend Development

How to Speed Up Nested Loops in Java: Break and Map Tricks

This article walks through a common Java scenario of matching two large lists with nested loops, measures the poor performance, then demonstrates two optimizations—adding a break statement and replacing the inner loop with a HashMap—to dramatically cut execution time.

HashMapNested Loopalgorithm
0 likes · 6 min read
How to Speed Up Nested Loops in Java: Break and Map Tricks
MaGe Linux Operations
MaGe Linux Operations
Jun 20, 2025 · Backend Development

Master Nginx Load Balancing: Algorithms, Reverse Proxy, and Real‑World Configs

This article explains how Nginx functions as a load balancer and reverse proxy, detailing its event‑driven architecture, multi‑process model, and core configuration, and compares common algorithms such as round‑robin, least‑connections, IP‑hash, weighted round‑robin, and weighted least‑connections with practical code examples.

BackendConfigurationNginx
0 likes · 10 min read
Master Nginx Load Balancing: Algorithms, Reverse Proxy, and Real‑World Configs
Architect's Guide
Architect's Guide
Jun 18, 2025 · Fundamentals

Master LRU Cache: O(1) Implementation with Hash-Linked List in Java

Learn how to design and implement an O(1) LRU (Least Recently Used) cache in Java using a combined hash map and doubly linked list, covering algorithm concepts, data structure choices, method details, and complete code with examples and explanations.

Doubly Linked ListO(1) Operationsalgorithm
0 likes · 10 min read
Master LRU Cache: O(1) Implementation with Hash-Linked List in Java
Code Mala Tang
Code Mala Tang
Jun 17, 2025 · Backend Development

Mastering Rate Limiting: Algorithms, Redis & Lua for Scalable Backend APIs

This article explains the concept of rate limiting, compares five common algorithms—including fixed‑window, sliding‑log, sliding‑window counter, token bucket and leaky bucket—covers distributed designs using Redis and Lua scripts, and provides complete FastAPI implementation and pytest tests for both fixed‑window and sliding‑log strategies.

BackendFastAPILua
0 likes · 13 min read
Mastering Rate Limiting: Algorithms, Redis & Lua for Scalable Backend APIs
JD Tech
JD Tech
Jun 16, 2025 · Operations

How Advanced Optimization and Simulation Algorithms Transform Supply Chain Planning

This article explores how cutting‑edge optimization and simulation techniques empower supply‑chain planning—covering network design, inventory layout, and large‑scale scenario modeling—to reduce costs, improve efficiency, and enhance user experience through fast, scalable algorithms and AI‑driven insights.

Operations ResearchSupply Chainalgorithm
0 likes · 9 min read
How Advanced Optimization and Simulation Algorithms Transform Supply Chain Planning
Qunhe Technology Quality Tech
Qunhe Technology Quality Tech
Jun 12, 2025 · Artificial Intelligence

Boosting CAD & Ad Design Algorithms with a Goldenset Review Platform

The article describes how a custom algorithm review platform, built around goldenset test cases, quantifies and visualizes CAD recognition and advertising design tool outputs, enabling rapid regression testing, objective metric tracking, and efficient manual review, ultimately improving development speed and bug detection rates.

AdvertisingCADMetrics
0 likes · 12 min read
Boosting CAD & Ad Design Algorithms with a Goldenset Review Platform
php Courses
php Courses
Jun 4, 2025 · Backend Development

Detecting Duplicate Elements in an Array with PHP

This article explains how to determine whether an integer array contains any duplicate values using a PHP solution that iterates the array, stores seen elements in an associative map, and returns true on the first repeat, with O(n) time and space complexity.

ArrayPHPalgorithm
0 likes · 4 min read
Detecting Duplicate Elements in an Array with PHP
php Courses
php Courses
May 29, 2025 · Backend Development

Fast Multiplication of Large Integers Using PHP GMP Library

This article introduces the GMP library for high‑precision arithmetic in PHP and explains a fast multiplication algorithm that reduces complexity by splitting large numbers, then provides a complete PHP implementation demonstrating recursive Karatsuba‑style multiplication for big integers.

GMPKaratsubaPHP
0 likes · 4 min read
Fast Multiplication of Large Integers Using PHP GMP Library
JD Tech Talk
JD Tech Talk
May 13, 2025 · Operations

Intelligent Supply Chain Planning Algorithms and Their Applications

The article introduces intelligent supply chain planning algorithms—including network design, inventory layout, and simulation—detailing their optimization models, high‑performance solving techniques, and real‑world impact on cost reduction, efficiency, and service experience across large‑scale logistics operations.

LogisticsOperationsSupply Chain
0 likes · 12 min read
Intelligent Supply Chain Planning Algorithms and Their Applications
Java Tech Enthusiast
Java Tech Enthusiast
Apr 26, 2025 · Fundamentals

Valid Parentheses Problem – Solution, Explanation, and Mid‑Career Insights

The article reflects on why mid‑career engineers are often relegated to legacy‑maintenance work, argues that such roles can be leveraged for growth by modernizing systems and adopting AI, and then presents the classic Valid Parentheses coding challenge, explaining a stack‑based solution with implementations, complexity analysis, and common pitfalls.

PythonStackalgorithm
0 likes · 14 min read
Valid Parentheses Problem – Solution, Explanation, and Mid‑Career Insights
Java Tech Enthusiast
Java Tech Enthusiast
Apr 25, 2025 · Fundamentals

Effective Reverse Questions for Algorithm Interview Rounds

In algorithm‑focused internet company interviews, asking thoughtful reverse‑questions—such as the core competitiveness of algorithm engineers, challenging project problems, debugging experiences, and methods for guaranteeing correctness—demonstrates genuine interest, technical depth, and a passion for improvement, leaving a strong positive impression on interviewers.

algorithmcareer adviceinterview
0 likes · 4 min read
Effective Reverse Questions for Algorithm Interview Rounds
Raymond Ops
Raymond Ops
Apr 24, 2025 · Fundamentals

Master Recursion: Classic Python Examples and Core Concepts

This article introduces recursion, explains its definition and key characteristics, and demonstrates classic Python examples such as factorial calculation, Fibonacci sequence generation, and binary search, helping readers grasp how recursion simplifies complex problems compared to iterative loops.

Binary SearchFibonacciPython
0 likes · 8 min read
Master Recursion: Classic Python Examples and Core Concepts
Java Captain
Java Captain
Apr 23, 2025 · Fundamentals

Understanding Recursion in Java: Concepts, Pros/Cons, and Practical Examples

This article explains the fundamentals of recursion in Java, covering its definition, advantages and disadvantages, differences from iteration, and provides practical examples such as traversing comment and department trees, along with code snippets, performance considerations, and improvement strategies using depth control and Stream API.

Code ExampleRecursionalgorithm
0 likes · 7 min read
Understanding Recursion in Java: Concepts, Pros/Cons, and Practical Examples
php Courses
php Courses
Apr 9, 2025 · Fundamentals

Pre-order Traversal in PHP: Recursive, Iterative, and Interactive Implementations

This article explains the concept of pre-order (root-left-right) tree traversal, demonstrates how to represent binary trees in PHP, provides recursive and stack‑based iterative implementations, and includes an interactive script that lets users build a tree and choose traversal methods, with full example code.

IterativePHPPre-order
0 likes · 9 min read
Pre-order Traversal in PHP: Recursive, Iterative, and Interactive Implementations
php Courses
php Courses
Apr 8, 2025 · Backend Development

Applying Prefix Sum Technique in PHP for Efficient Subarray Sum Queries

This article explains the concept of prefix sums, demonstrates how to build and use a prefix‑sum array in PHP with clear code examples, and discusses when the technique is advantageous and its limitations, enabling O(1) interval sum queries after an O(n) preprocessing step.

BackendPHPPrefix Sum
0 likes · 10 min read
Applying Prefix Sum Technique in PHP for Efficient Subarray Sum Queries
JD Cloud Developers
JD Cloud Developers
Apr 8, 2025 · Fundamentals

Which String Replacement Method Is Fastest? A Java Performance Comparison

This article examines various Java string‑replacement techniques—including simple replace, regex, Aho‑Corasick, and custom Trie implementations—by presenting their design, code samples, and detailed performance benchmarks to help developers choose the most efficient solution for large keyword sets.

Aho-CorasickJava performanceTrie
0 likes · 13 min read
Which String Replacement Method Is Fastest? A Java Performance Comparison
Java Tech Enthusiast
Java Tech Enthusiast
Apr 6, 2025 · Fundamentals

Git Rebase vs Merge and Number-to-String Translation Using Dynamic Programming

The article compares git rebase and git merge—explaining that merge preserves history with extra commits while rebase creates a linear log but rewrites public history—then presents a dynamic‑programming solution for translating a numeric string to letters, using dp[i]=dp[i‑1]+dp[i‑2] when the two‑digit slice is between 10 and 25, achieving O(n) time.

Gitalgorithmdynamic programming
0 likes · 6 min read
Git Rebase vs Merge and Number-to-String Translation Using Dynamic Programming
Cognitive Technology Team
Cognitive Technology Team
Apr 2, 2025 · Backend Development

Understanding Rate Limiting: Importance, Types, Algorithms, and Implementation

This article explains the concept of rate limiting in system design, covering its importance, common use cases, various types, popular algorithms such as token bucket and leaky bucket, implementation across different system layers, and the challenges associated with configuring and scaling rate‑limiting solutions.

BackendSystem Designalgorithm
0 likes · 10 min read
Understanding Rate Limiting: Importance, Types, Algorithms, and Implementation
php Courses
php Courses
Apr 2, 2025 · Fundamentals

Implementing a Queue Using Two Stacks in PHP

This article explains the principles of queues and stacks, demonstrates how to simulate a FIFO queue using two LIFO stacks in PHP, provides full source code, usage examples, complexity analysis, and discusses practical applications and possible extensions.

Data StructurePHPQueue
0 likes · 5 min read
Implementing a Queue Using Two Stacks in PHP
Qunar Tech Salon
Qunar Tech Salon
Mar 27, 2025 · Operations

Automated Capacity Planning and Auto‑Scaling for Hotel Services During Traffic Peaks

This document describes a comprehensive capacity‑planning solution that predicts traffic‑peak impacts for hotel services, automatically estimates required CPU resources, creates timed scaling tasks, and evaluates performance using detailed metrics, thereby improving operational efficiency and reducing manual effort during events such as exam‑ticket printing and holiday travel surges.

Auto ScalingOperationsResource Management
0 likes · 12 min read
Automated Capacity Planning and Auto‑Scaling for Hotel Services During Traffic Peaks
Python Crawling & Data Mining
Python Crawling & Data Mining
Mar 15, 2025 · Fundamentals

5 Ways to Count Consecutive Elements in a Python List

This article walks through a Python list problem where you need to compute the length of consecutive identical elements, presenting five distinct code solutions with explanations, sample inputs, and output visualizations to help readers understand and apply the techniques.

Code ExamplesListPython
0 likes · 6 min read
5 Ways to Count Consecutive Elements in a Python List
AI Code to Success
AI Code to Success
Mar 12, 2025 · Artificial Intelligence

Mastering K‑Means: Theory, Implementation, and Real‑World Applications

This comprehensive guide explores the K‑Means clustering algorithm, covering its mathematical foundation, step‑by‑step procedure, centroid initialization strategies, practical implementation with Python’s Scikit‑learn on the Iris dataset, evaluation metrics, optimization techniques, and diverse applications ranging from image segmentation to bioinformatics.

K-MeansPythonalgorithm
0 likes · 31 min read
Mastering K‑Means: Theory, Implementation, and Real‑World Applications
Code Mala Tang
Code Mala Tang
Mar 1, 2025 · Fundamentals

Why Python’s deque Beats Lists for Fast Insertions: A Practical Guide

This article explains why Python lists are slow for head insertions and deletions, introduces the deque data structure from the collections module, compares their time complexities, and shows practical scenarios and code examples where deque provides superior performance and thread‑safety.

Data StructuresListPython
0 likes · 7 min read
Why Python’s deque Beats Lists for Fast Insertions: A Practical Guide
Su San Talks Tech
Su San Talks Tech
Feb 20, 2025 · Fundamentals

Master the Longest Palindromic Substring Problem with DP in Java & C++

After a humorous anecdote about job background checks, this article dives into LeetCode's classic Longest Palindromic Substring problem, explains brute‑force, center‑expansion, and dynamic‑programming approaches, and provides complete Java and C++ implementations with detailed DP recurrence and traversal strategies.

algorithmdynamic programmingpalindrome
0 likes · 8 min read
Master the Longest Palindromic Substring Problem with DP in Java & C++
Java Architecture Stack
Java Architecture Stack
Feb 19, 2025 · Fundamentals

Master Python Linked List: Reverse and Merge Techniques Explained

This article explains practical Python implementations for reversing a linked list using iterative and recursive approaches, merging two or multiple sorted linked lists, handling edge cases such as empty inputs, and includes complete code samples with complexity analysis for each method.

Data StructuresPythonalgorithm
0 likes · 12 min read
Master Python Linked List: Reverse and Merge Techniques Explained
Java Tech Enthusiast
Java Tech Enthusiast
Feb 4, 2025 · Fundamentals

LeetCode 31 – Next Permutation: Problem, Analysis, and Code

The Next Permutation problem asks to rearrange an integer array into the immediate lexicographically larger ordering—or the smallest order if none exists—by scanning from the right to find the first decreasing pair, swapping with the next larger element, and reversing the suffix, using O(1) extra space, with implementations provided in Java, C++, and Python.

LeetCodePythonalgorithm
0 likes · 7 min read
LeetCode 31 – Next Permutation: Problem, Analysis, and Code
IT Services Circle
IT Services Circle
Feb 1, 2025 · Fundamentals

Understanding Dynamic Programming through Staircase and Knapsack Examples

This article walks through the fundamentals of dynamic programming by illustrating how to solve a staircase climbing problem and a 0/1 knapsack problem, explaining optimal substructure, state transition equations, boundary conditions, and providing both recursive and iterative C++ implementations.

Recursionalgorithmdynamic programming
0 likes · 12 min read
Understanding Dynamic Programming through Staircase and Knapsack Examples
21CTO
21CTO
Jan 26, 2025 · Artificial Intelligence

How TikTok’s Secret Recommendation Engine Powers Its Global Addiction

The article examines Trump’s executive order on TikTok, the platform’s demand to sell half its equity to a U.S. entity, and delves into the sophisticated AI‑driven recommendation algorithms—highlighting the Monolith real‑time system, online training, and research that explain TikTok’s addictive success.

AIReal-time TrainingTikTok
0 likes · 8 min read
How TikTok’s Secret Recommendation Engine Powers Its Global Addiction
Java Tech Enthusiast
Java Tech Enthusiast
Jan 24, 2025 · Fundamentals

Sum of Two Integers Without Using + or - Operators

The problem asks to add two integers without using '+' or '-', which is solved by repeatedly applying bitwise XOR to obtain the sum without carry and left‑shifted AND to compute the carry until it vanishes, as demonstrated in concise Java and Python implementations with O(1) time and space complexity.

algorithmbitwiseno-plus-minus
0 likes · 4 min read
Sum of Two Integers Without Using + or - Operators
Tencent Cloud Developer
Tencent Cloud Developer
Jan 22, 2025 · Cloud Native

Rate Limiting: Concepts, Algorithms, and Distributed Solutions

Rate limiting protects micro‑service stability by rejecting excess traffic, using algorithms such as fixed‑window, sliding‑window, leaky‑bucket and token‑bucket, and can be deployed locally or distributed via Redis, load‑balancers, or coordination services, each offering different trade‑offs in precision, scalability, and complexity.

Distributed SystemsGolangMicroservices
0 likes · 31 min read
Rate Limiting: Concepts, Algorithms, and Distributed Solutions
Java Tech Enthusiast
Java Tech Enthusiast
Jan 22, 2025 · Fundamentals

LeetCode 31 – Next Permutation: Problem Explanation and Multi‑Language Solutions

LeetCode problem 31, Next Permutation, requires rearranging an integer array in‑place to the lexicographically next greater arrangement by locating the first decreasing pair from the right, swapping it with the smallest larger element, and reversing the suffix, with Java, C++, and Python reference implementations provided.

Arrayalgorithmin-place
0 likes · 6 min read
LeetCode 31 – Next Permutation: Problem Explanation and Multi‑Language Solutions
Ops Development & AI Practice
Ops Development & AI Practice
Jan 18, 2025 · Fundamentals

How to Find the Unique Number in O(n) Time Using XOR in Go

This article explains how to identify the single non‑repeating integer in a list where every other number appears twice, using an O(n) time and O(1) space XOR‑based algorithm, complete with Go code, step‑by‑step analysis, complexity discussion, and UML activity diagram.

Golangalgorithmspace complexity
0 likes · 6 min read
How to Find the Unique Number in O(n) Time Using XOR in Go
php Courses
php Courses
Jan 15, 2025 · Backend Development

Detecting Duplicate Elements in an Array with PHP

This article explains how to determine whether an integer array contains duplicate values by iterating through the elements, using a PHP associative array for constant‑time lookups, and provides the full solution code along with its execution flow, time and space complexity analysis.

ArrayPHPalgorithm
0 likes · 4 min read
Detecting Duplicate Elements in an Array with PHP
JD Tech Talk
JD Tech Talk
Jan 13, 2025 · Backend Development

Recursive Order Merging Algorithm for JD Logistics Inbound Service

This article describes the background, problem definition, recursive algorithm design, Java implementation, deduplication logic, performance considerations, and business impact of a SKU‑level order merging solution for JD Logistics' inbound-to-warehouse process.

BackendLogisticsRecursion
0 likes · 10 min read
Recursive Order Merging Algorithm for JD Logistics Inbound Service
Java Architect Essentials
Java Architect Essentials
Dec 24, 2024 · Information Security

Techniques for Performing Fuzzy Queries on Encrypted Data

This article examines the challenges of fuzzy searching encrypted data and presents three categories of solutions—naïve in‑memory decryption, conventional database‑level approaches, and advanced algorithmic methods—evaluating their implementation steps, security implications, and performance trade‑offs.

Information Securityalgorithmencryption
0 likes · 11 min read
Techniques for Performing Fuzzy Queries on Encrypted Data
macrozheng
macrozheng
Dec 16, 2024 · Backend Development

Boost Java Loop Performance: Replace Nested Loops with a HashMap

This article demonstrates how to dramatically speed up Java code that matches items between two large lists by eliminating nested loops, using early‑exit with break and, more effectively, pre‑building a HashMap for O(1) lookups, with concrete timing results and full code examples.

HashMapalgorithmbackend-development
0 likes · 8 min read
Boost Java Loop Performance: Replace Nested Loops with a HashMap
Java Tech Enthusiast
Java Tech Enthusiast
Dec 12, 2024 · Fundamentals

LeetCode 814: Binary Tree Pruning

The article explains LeetCode 814, where a binary tree of 0s and 1s is pruned by recursively removing subtrees lacking a 1, using a post‑order traversal that returns null for nodes with value 0 and no retained children, achieving O(n) time and O(h) space.

LeetCodePythonRecursion
0 likes · 6 min read
LeetCode 814: Binary Tree Pruning
Tencent Cloud Developer
Tencent Cloud Developer
Dec 12, 2024 · Backend Development

Common Rate Limiting Algorithms: Fixed Window, Sliding Window, Sliding Log, Leaky Bucket, and Token Bucket

The article examines five common rate‑limiting algorithms—Fixed Window, Sliding Window, Sliding Log, Leaky Bucket, and Token Bucket—detailing their principles, pros and cons, and providing complete C++ implementations to help developers choose the best approach for controlling traffic bursts and ensuring system stability.

BackendC++Distributed Systems
0 likes · 14 min read
Common Rate Limiting Algorithms: Fixed Window, Sliding Window, Sliding Log, Leaky Bucket, and Token Bucket
Python Crawling & Data Mining
Python Crawling & Data Mining
Dec 11, 2024 · Fundamentals

Master the ‘Sum of Numbers Ignoring 6‑9 Sections’ Challenge in Python

This article walks through a Python list‑processing problem that requires summing numbers while skipping any segment that starts with a 6 and ends with the next 9, presenting multiple solution approaches—including index tricks, flag control, while loops, and recursion—to help readers understand and implement the algorithm effectively.

ListPythonRecursion
0 likes · 7 min read
Master the ‘Sum of Numbers Ignoring 6‑9 Sections’ Challenge in Python