Home Backend Development PHP Tutorial Number of Ways to Form a Target String Given a Dictionary

Number of Ways to Form a Target String Given a Dictionary

Dec 30, 2024 pm 05:34 PM

Number of Ways to Form a Target String Given a Dictionary

1639. Number of Ways to Form a Target String Given a Dictionary

Difficulty: Hard

Topics: Array, String, Dynamic Programming

You are given a list of strings of the same length words and a string target.

Your task is to form target using the given words under the following rules:

  • target should be formed from left to right.
  • To form the ith character (0-indexed) of target, you can choose the kth character of the jth string in words if target[i] = words[j][k].
  • Once you use the kth character of the jth string of words, you can no longer use the xth character of any string in words where x <= k. In other words, all characters to the left of or at index k become unusuable for every string.
  • Repeat the process until you form the string target.

Notice that you can use multiple characters from the same string in words provided the conditions above are met.

Return the number of ways to form target from words. Since the answer may be too large, return it modulo 109 7.

Example 1:

  • Input: words = ["acca","bbbb","caca"], target = "aba"
  • Output: 6
  • Explanation: There are 6 ways to form target.
    • "aba" -> index 0 ("acca"), index 1 ("bbbb"), index 3 ("caca")
    • "aba" -> index 0 ("acca"), index 2 ("bbbb"), index 3 ("caca")
    • "aba" -> index 0 ("acca"), index 1 ("bbbb"), index 3 ("acca")
    • "aba" -> index 0 ("acca"), index 2 ("bbbb"), index 3 ("acca")
    • "aba" -> index 1 ("caca"), index 2 ("bbbb"), index 3 ("acca")
    • "aba" -> index 1 ("caca"), index 2 ("bbbb"), index 3 ("caca")

    Example 2:

    • Input: words = ["abba","baab"], target = "bab"
    • Output: 4
    • Explanation: There are 4 ways to form target.
      • "bab" -> index 0 ("baab"), index 1 ("baab"), index 2 ("abba")
      • "bab" -> index 0 ("baab"), index 1 ("baab"), index 3 ("baab")
      • "bab" -> index 0 ("baab"), index 2 ("baab"), index 3 ("baab")
      • "bab" -> index 1 ("abba"), index 2 ("baab"), index 3 ("baab")

    Constraints:

    • 1 <= words.length <= 1000
    • 1 <= words[i].length <= 1000
    • All strings in words have the same length.
    • 1 <= target.length <= 1000
    • words[i] and target contain only lowercase English letters.

    Hint:

    1. For each index i, store the frequency of each character in the ith row.
    2. Use dynamic programing to calculate the number of ways to get the target string using the frequency array.

    Solution:

    The problem requires finding the number of ways to form a target string from a dictionary of words, following specific rules about character usage. This is a combinatorial problem that can be solved efficiently using Dynamic Programming (DP) and preprocessing character frequencies.

    Key Points

    1. Constraints:
      • Words are of the same length.
      • Characters in words can only be used in a left-to-right manner.
    2. Challenges:
      • Efficiently counting ways to form target due to large constraints.
      • Avoid recomputation with memoization.
    3. Modulo:
      • Since the result can be large, all calculations are done modulo 109 7.

    Approach

    The solution uses:

    1. Preprocessing:
      • Count the frequency of each character at every position across all words.
    2. Dynamic Programming:
      • Use a 2D DP table to calculate the number of ways to form the target string.

    Steps:

    1. Preprocess words into a frequency array (counts).
    2. Define a DP function to recursively find the number of ways to form target using the preprocessed counts.

    Plan

    1. Input Parsing:
      • Accept words and target.
    2. Preprocess:
      • Create a counts array where counts[j][char] represents the frequency of char at position j in all words.
    3. Dynamic Programming:
      • Use a recursive function with memoization to compute the number of ways to form target using characters from valid positions in words.
    4. Return the Result:
      • Return the total count modulo 109 7.

    Let's implement this solution in PHP: 1639. Number of Ways to Form a Target String Given a Dictionary

    
    
    
    
    
    

    Explanation:

    1. Preprocessing Step:

      • Build a counts array:
        • For each column in words, count the occurrences of each character.
      • Example: If words = ["acca", "bbbb", "caca"], for the first column, counts[0] = {'a': 1, 'b': 1, 'c': 1}.
    2. Recursive DP:

      • Define dp(i, j):
        • i is the current index in target.
        • j is the current position in words.
      • Base Cases:
        • If i == len(target): Entire target formed → return 1.
        • If j == len(words[0]): No more columns to use → return 0.
      • Recurrence:
        • Option 1: Use counts[j][target[i]] characters from position j.
        • Option 2: Skip position j.
    3. Optimization:

      • Use a memoization table to store results of overlapping subproblems.

    Example Walkthrough

    Input:

    words = ["acca", "bbbb", "caca"], target = "aba"

    1. Preprocessing:

      • counts[0] = {'a': 2, 'b': 0, 'c': 1}
      • counts[1] = {'a': 0, 'b': 3, 'c': 0}
      • counts[2] = {'a': 1, 'b': 0, 'c': 2}
      • counts[3] = {'a': 2, 'b': 0, 'c': 1}
    2. DP Calculation:

      • dp(0, 0): How many ways to form "aba" starting from column 0.
      • Recursively calculate, combining the use of counts and skipping columns.

    Output: 6

    Time Complexity

    1. Preprocessing: O(n x m), where n is the number of words and m is their length.
    2. Dynamic Programming: O(l x m), where l is the length of the target.
    3. Total: O(n x m l x m).

    Output for Example

    • Input: words = ["acca", "bbbb", "caca"], target = "aba"
    • Output: 6

    This problem is a great example of combining preprocessing and dynamic programming to solve a combinatorial challenge efficiently.

    Contact Links

    If you found this series helpful, please consider giving the repository a star on GitHub or sharing the post on your favorite social networks ?. Your support would mean a lot to me!

    If you want more helpful content like this, feel free to follow me:

    • LinkedIn
    • GitHub

The above is the detailed content of Number of Ways to Form a Target String Given a Dictionary. For more information, please follow other related articles on the PHP Chinese website!

Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

Video Face Swap

Video Face Swap

Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

Explain JSON Web Tokens (JWT) and their use case in PHP APIs. Explain JSON Web Tokens (JWT) and their use case in PHP APIs. Apr 05, 2025 am 12:04 AM

JWT is an open standard based on JSON, used to securely transmit information between parties, mainly for identity authentication and information exchange. 1. JWT consists of three parts: Header, Payload and Signature. 2. The working principle of JWT includes three steps: generating JWT, verifying JWT and parsing Payload. 3. When using JWT for authentication in PHP, JWT can be generated and verified, and user role and permission information can be included in advanced usage. 4. Common errors include signature verification failure, token expiration, and payload oversized. Debugging skills include using debugging tools and logging. 5. Performance optimization and best practices include using appropriate signature algorithms, setting validity periods reasonably,

How does session hijacking work and how can you mitigate it in PHP? How does session hijacking work and how can you mitigate it in PHP? Apr 06, 2025 am 12:02 AM

Session hijacking can be achieved through the following steps: 1. Obtain the session ID, 2. Use the session ID, 3. Keep the session active. The methods to prevent session hijacking in PHP include: 1. Use the session_regenerate_id() function to regenerate the session ID, 2. Store session data through the database, 3. Ensure that all session data is transmitted through HTTPS.

Describe the SOLID principles and how they apply to PHP development. Describe the SOLID principles and how they apply to PHP development. Apr 03, 2025 am 12:04 AM

The application of SOLID principle in PHP development includes: 1. Single responsibility principle (SRP): Each class is responsible for only one function. 2. Open and close principle (OCP): Changes are achieved through extension rather than modification. 3. Lisch's Substitution Principle (LSP): Subclasses can replace base classes without affecting program accuracy. 4. Interface isolation principle (ISP): Use fine-grained interfaces to avoid dependencies and unused methods. 5. Dependency inversion principle (DIP): High and low-level modules rely on abstraction and are implemented through dependency injection.

How to debug CLI mode in PHPStorm? How to debug CLI mode in PHPStorm? Apr 01, 2025 pm 02:57 PM

How to debug CLI mode in PHPStorm? When developing with PHPStorm, sometimes we need to debug PHP in command line interface (CLI) mode...

Framework Security Features: Protecting against vulnerabilities. Framework Security Features: Protecting against vulnerabilities. Mar 28, 2025 pm 05:11 PM

Article discusses essential security features in frameworks to protect against vulnerabilities, including input validation, authentication, and regular updates.

How to automatically set permissions of unixsocket after system restart? How to automatically set permissions of unixsocket after system restart? Mar 31, 2025 pm 11:54 PM

How to automatically set the permissions of unixsocket after the system restarts. Every time the system restarts, we need to execute the following command to modify the permissions of unixsocket: sudo...

Explain late static binding in PHP (static::). Explain late static binding in PHP (static::). Apr 03, 2025 am 12:04 AM

Static binding (static::) implements late static binding (LSB) in PHP, allowing calling classes to be referenced in static contexts rather than defining classes. 1) The parsing process is performed at runtime, 2) Look up the call class in the inheritance relationship, 3) It may bring performance overhead.

See all articles