Posts

Showing posts from September, 2023

The WeakReference class, monitoring memory leak and garbage collection in a Java application

Image
 Below is a Stack implementation that uses an internal resizeable array structure.  public class MyStack< T > implements Stack< T > { private static final int CAPACITY = 100 ; private Object[] array ; private int pos = 0 ; public MyStack () { this . array = new Object[ CAPACITY ] ; } @Override public void push ( T item) { if ( pos >= array . length / 2 ) { Object[] newArray = new Object[ pos * 2 ] ; System. arraycopy ( array , 0 , newArray , 0 , array . length ) ; array = newArray ; } array [ pos ++] = item ; } @Override public T pop () { if (isEmpty()) { throw new RuntimeException( "empty stack" ) ; } @SuppressWarnings ( "unchecked" ) T item = ( T ) array [ pos - 1 ] ; pos -= 1 ; return item ; } @Override @SuppressWarnings ( "unchecked" ) public T peek...

A Nice Explanation of the Public Key Cryptography

Recently I've read the explanation below, which is quite good and easy to understand: Public key cryptography, also known as asymmetric cryptography, is a cryptographic technique that uses a pair of keys, a public key and a private key, for secure communication and encryption. This system is widely used in various applications, including secure communication over the internet, digital signatures, and secure data storage. Let's dive into how public key cryptography works step by step: 1. Key Pair Generation: A user or entity generates a key pair consisting of a public key and a private key. These keys are mathematically related, but it is computationally infeasible to derive the private key from the public key. 2. Public Key Distribution: The user or entity freely distributes their public key to anyone who needs to communicate with them securely. The public key can be shared openly and is used for encryption. 3. Private Key Protection: The private key is kept secret and securely...

Popular posts from this blog

Trie Data Structure and Finding Patterns in a Collection of Words

My Crappy Looking Solution to "Binary Tree Common Ancestor" Problem

A Graph Application in Java: Using WordNet to Find Outcast Words