392[Medium]: Is Subsequence

本文介绍了一个经典的字符串匹配问题——检查一个字符串是否为另一个字符串的子序列,并提供了一种使用双循环进行暴力匹配的方法。该方法适用于短字符串s与长字符串t的匹配场景。

Part1:问题描述

Given a string s and a string t, check if s is subsequence of t.

You may assume that there is only lower case English letters in both s and tt is potentially a very long (length ~= 500,000) string, and sis a short string (<=100).

A subsequence of a string is a new string which is formed from the original string by deleting some (can be none) of the characters without disturbing the relative positions of the remaining characters. (ie, "ace" is a subsequence of "abcde" while "aec" is not).

Example 1:
s = "abc"t = "ahbgdc"

Return true.

Example 2:
s = "axc"t = "ahbgdc"

Return false.

Follow up:
If there are lots of incoming S, say S1, S2, ... , Sk where k >= 1B, and you want to check one by one to see if T has its subsequence. In this scenario, how would you change your code?

Credits:
Special thanks to @pbrother for adding this problem and creating all test cases.



Part2:解题思路

  这一题我用的暴力解题,直接2个for循环判断s里的字符有没有在t中出现,值得注意的是字符出现的顺序也要一致。我觉得我有改进的地方在于第二个for循环的时候我用的下标是一个函数里面的全局变量index,这样就可以保证下一次从t中开始找的字符是上一次判断用过的字符之后的。第一个if里面有嵌套的一个if是因为不加类似第一个样例--最后一个相等的字符在最后出现时的样例判断会出错。


Part3:代码

class Solution {
public:
    bool isSubsequence(string s, string t) {
	int length1 = s.length();
	int length2 = t.length();
	if (length1 > length2) return false;
	int index = 0;
	int i = 0;
	for (i; i < length1; i++) {
		for (index; index < length2; ) {
			if (s[i] == t[index++]) {
				if (index == length2 && i != length1 - 1) {
					return false;
				}
				break;
			}
			
			if (index == length2) {
				return false;
			}
		}
	}
	return true;
}
};


CVE-2022-41741 A vulnerability in the module ngx_http_mp4_module might allow a local attacker to corrupt NGINX worker memory, resulting in its termination or potential other impact using a specially crafted audio or video file. The attack is only possible if an attacker can gain privileged access to the host running NGINX, place a specially crafted audio or video file within the webroot, and then trigger NGINX to process the specially crafted file. v3.1 v4.0 Base 7.0 7.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N CVSS v4 Score: Base 7.3 Metric Value Comments Attack Vector Local An attacker must be able to access the vulnerable system with a local, interactive session. Attack Complexity Low No specialized conditions or advanced knowledge are required. Attack Requirements Present Multiple conditions that require target specific reconnaissance and preparation must be satisfied in order to achieve successful exploitation of this vulnerability. Privileges Required Low An attacker must be able to place a file within the web root to be processed by NGINX. User Interaction None No user interaction is required for an attacker to successfully exploit the vulnerability. Vulnerable System Confidentiality High The attacker could execute arbitrary code on the vulnerable system with elevated privileges. Vulnerable System Integrity High The attacker could execute arbitrary code on the vulnerable system with elevated privileges. Vulnerable System Availability High The attacker could execute arbitrary code on the vulnerable system with elevated privileges. Subsequent System Confidentiality None There is no impact to the subsequent system confidentiality. Subsequent System Integrity None There is no impact to the subsequent system integrity. Subsequent System Availability None There is no impact to the subsequent system availability. CVE-2020-3549 A vulnerability in the sftunnel functionality of Cisco Firepower Management Center (FMC) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to obtain the device registration hash. The vulnerability is due to insufficient sftunnel negotiation protection during initial device registration. An attacker in a man-in-the-middle position could exploit this vulnerability by intercepting a specific flow of the sftunnel communication between an FMC device and an FTD device. A successful exploit could allow the attacker to decrypt and modify the sftunnel communication between FMC and FTD devices, allowing the attacker to modify configuration data sent from an FMC device to an FTD device or alert data sent from an FTD device to an FMC device. v3.1 v4.0 Base 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H 7.7 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N Base + Threat 5.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U CVSS v4 Score: Base + Threat 5.2 Metric Value Comments Attack Vector Network The vulnerable system is accessible from remote networks. Attack Complexity Low No specialized conditions or advanced knowledge are required. Attack Requirements Present An attacker must be on-path to be able to intercept communications between affected systems. Privileges Required None No privileges are required for an attacker to successfully exploit the vulnerability. User Interaction Passive A user must be logged in and using the application for traffic to be generated that an attacker could capture. Vulnerable System Confidentiality High An attacker could gain access to the system with a highly privileged user account. Vulnerable System Integrity High An attacker could gain access to the system with a highly privileged user account. Vulnerable System Availability High An attacker could gain access to the system with a highly privileged user account. Subsequent System Confidentiality None There is no impact to the vulnerable system confidentiality. Subsequent System Integrity None There is no impact to the vulnerable system integrity. Subsequent System Availability None There is no impact to the vulnerable system availability. Exploit Maturity Unreported There is no known proof-of-concept code or malicious exploitation of this vulnerability.
07-09
源码来自:https://pan.quark.cn/s/41b9d28f0d6d 在信息技术领域中,jQuery作为一个广受欢迎的JavaScript框架,显著简化了诸多操作,包括对HTML文档的遍历、事件的管理、动画的设计以及Ajax通信等。 本篇文档将深入阐释如何运用jQuery达成一个图片自动播放的功能,这种效果常用于网站的轮播展示或幻灯片演示,有助于优化用户与页面的互动,使网页呈现更加动态的视觉体验。 为了有效实施这一功能,首先需掌握jQuery的核心操作。 通过$符号作为接口,jQuery能够迅速选取DOM组件,例如$("#id")用于选取具有特定ID的元素,而$(".class")则能选取所有应用了某类class的元素。 在选定元素之后,可以执行多种行为,诸如事件监听、样式的变更、内容的更新以及动画的制作等。 关于“一个基于jQuery的图片自动播放功能”,首要任务是准备一组图片素材,这些素材将被整合至一个容器元素之中。 例如,可以构建一个div元素,将其宽度设定为单张图片的尺寸,再借助CSS实现溢出内容的隐藏,从而构建出水平滚动的初始框架。 ```html<div id="slider"> <img src="image1.jpg" alt="Image 1"> <img src="image2.jpg" alt="Image 2"> <!-- 更多图片内容... --></div>```接着,需要编写jQuery脚本以实现图片的自动切换。 这通常涉及到定时器的运用,以设定周期性间隔自动更换当前显示的图片。 通过使用`.fadeOut()`和`.fadeIn()`方法,能够实现图片间的平滑过渡,增强视觉效果。 ```javascript$(document).re...
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值