You are given the strings keyand message, which represent a cipher key and a secret message, respectively. The steps to decode messageare as follows:
Use the first appearance of all 26 lowercase English letters in keyas the order of the substitution table.
Align the substitution table with the regular English alphabet.
【资料图】
Each letter in messageis then substituted using the table.
Spaces ' 'are transformed to themselves.
For example, given key = "happy boy"(actual key would have at least one instance of each letter in the alphabet), we have the partial substitution table of ('h' -> 'a', 'a' -> 'b', 'p' -> 'c', 'y' -> 'd', 'b' -> 'e', 'o' -> 'f').
Return the decoded message.
Example 1:
Input: key = "the quick brown fox jumps over the lazy dog",
message = "vkbs bs t suepuv"
Output: "this is a secret"
Explanation: The diagram above shows the substitution table.It is obtained by taking the first appearance of each letter in "the quick brown fox jumps over the lazy dog".
Example 2:
Input: key = "eljuxhpwnyrdgtqkviszcfmabo",
message = "zwx hnfx lqantp mnoeius ycgk vcnjrdb"
Output: "the five boxing wizards jump quickly"
Explanation:
The diagram above shows the substitution table.It is obtained by taking the first appearance of each letter in "eljuxhpwnyrdgtqkviszcfmabo".
Constraints:
26 <= key.length <= 2000
keyconsists of lowercase English letters and ' '.
keycontains every letter in the English alphabet ('a'to 'z') at least once.
1 <= message.length <= 2000
messageconsists of lowercase English letters and ' '.
题目是easy题目,其实就是做一个映射,然后根据message 返回映射的信息即可;
用hashmap可以,也可以直接用数组;下面是代码:
Runtime: 7 ms, faster than 71.47% of Java online submissions for Decode the Message.
Memory Usage: 42.7 MB, less than 50.31% of Java online submissions for Decode the Message.
关键词:




















Copyright 2015-2022 南方食品网 版权所有 备案号:粤ICP备18023326号-21 联系邮箱:855 729 8@qq.com