zoukankan      html  css  js  c++  java
  • LeetCode_190. Reverse Bits

    190. Reverse Bits

    Easy

    Reverse bits of a given 32 bits unsigned integer.

    Example 1:

    Input: 00000010100101000001111010011100
    Output: 00111001011110000010100101000000
    Explanation: The input binary string 00000010100101000001111010011100 represents the unsigned integer 43261596, so return 964176192 which its binary representation is 00111001011110000010100101000000.
    

    Example 2:

    Input: 11111111111111111111111111111101
    Output: 10111111111111111111111111111111
    Explanation: The input binary string 11111111111111111111111111111101 represents the unsigned integer 4294967293, so return 3221225471 which its binary representation is 10101111110010110010011101101001.

    Note:

    • Note that in some languages such as Java, there is no unsigned integer type. In this case, both input and output will be given as signed integer type and should not affect your implementation, as the internal binary representation of the integer is the same whether it is signed or unsigned.
    • In Java, the compiler represents the signed integers using 2's complement notation. Therefore, in Example 2 above the input represents the signed integer -3 and the output represents the signed integer -1073741825.

    Follow up:

    If this function is called many times, how would you optimize it?

    package leetcode.easy;
    
    public class ReverseBits {
    	// you need treat n as an unsigned value
    	public int reverseBits(int n) {
    		int result = 0;
    		for (int i = 0; i < 32; i++) {
    			result += n & 1;
    			n >>>= 1; // CATCH: must do unsigned shift
    			if (i < 31) { // CATCH: for last digit, don't shift!
    				result <<= 1;
    			}
    		}
    		return result;
    	}
    
    	@org.junit.Test
    	public void test() {
    		System.out.println(reverseBits(-3));
    	}
    }
    
  • 相关阅读:
    css如何设置div中的内容垂直居中?
    有哪些sql优化工具
    XSS攻击
    java的HashSet 原理
    复杂度O(n)计算
    Kubernetes(K8s)基础知识(docker容器技术)
    Golang glog使用详解
    教你如何找到Go内存泄露【精编实战】
    Linux生产环境上,最常用的一套“AWK“技巧【转】
    Go 程序的性能监控与分析 pprof
  • 原文地址:https://www.cnblogs.com/denggelin/p/11701594.html
Copyright © 2011-2022 走看看