This is a java program to find permutation of N numbers using Heap’s Algorithm. Heap’s algorithm is an algorithm used for generating all possible permutations of some given length.
Here is the source code of the Java Program to Implement Heap’s Algorithm for Permutation of N Numbers. The Java program is successfully compiled and run on a Windows system. The program output is also shown below.
package com.sanfoundry.combinatorial;
import java.util.Arrays;
import java.util.Scanner;
public class HeapsPermutation
{
private static void swap(int[] v, int i, int j)
{
int t = v[i];
v[i] = v[j];
v[j] = t;
}
public void permute(int[] v, int n)
{
if (n == 1)
{
System.out.println(Arrays.toString(v));
}
else
{
for (int i = 0; i < n; i++)
{
permute(v, n - 1);
if (n % 2 == 1)
{
swap(v, 0, n - 1);
}
else
{
swap(v, i, n - 1);
}
}
}
}
public static void main(String[] args)
{
System.out.println("Enter the number of elements in a sequence: ");
Scanner sc = new Scanner(System.in);
int n = sc.nextInt();
System.out.println("Enter the sequence: ");
int sequence[] = new int[n];
for (int i = 0; i < n; i++)
{
sequence[i] = sc.nextInt();
}
new HeapsPermutation().permute(sequence, n);
sc.close();
}
}
Output:
$ javac HeapsPermutation.java $ java HeapsPermutation Enter the number of elements in a sequence: 5 Enter the sequence: 2 4 7 3 8 [2, 4, 7, 3, 8] [4, 2, 7, 3, 8] [7, 2, 4, 3, 8] [2, 7, 4, 3, 8] [4, 7, 2, 3, 8] [7, 4, 2, 3, 8] [3, 4, 7, 2, 8] [4, 3, 7, 2, 8] [7, 3, 4, 2, 8] [3, 7, 4, 2, 8] [4, 7, 3, 2, 8] [7, 4, 3, 2, 8] [3, 2, 7, 4, 8] [2, 3, 7, 4, 8] [7, 3, 2, 4, 8] [3, 7, 2, 4, 8] [2, 7, 3, 4, 8] [7, 2, 3, 4, 8] [3, 2, 4, 7, 8] [2, 3, 4, 7, 8] [4, 3, 2, 7, 8] [3, 4, 2, 7, 8] [2, 4, 3, 7, 8] [4, 2, 3, 7, 8] [8, 2, 4, 7, 3] [2, 8, 4, 7, 3] [4, 8, 2, 7, 3] [8, 4, 2, 7, 3] [2, 4, 8, 7, 3] [4, 2, 8, 7, 3] [7, 2, 4, 8, 3] [2, 7, 4, 8, 3] [4, 7, 2, 8, 3] [7, 4, 2, 8, 3] [2, 4, 7, 8, 3] [4, 2, 7, 8, 3] [7, 8, 4, 2, 3] [8, 7, 4, 2, 3] [4, 7, 8, 2, 3] [7, 4, 8, 2, 3] [8, 4, 7, 2, 3] [4, 8, 7, 2, 3] [7, 8, 2, 4, 3] [8, 7, 2, 4, 3] [2, 7, 8, 4, 3] [7, 2, 8, 4, 3] [8, 2, 7, 4, 3] [2, 8, 7, 4, 3] [3, 8, 2, 4, 7] [8, 3, 2, 4, 7] [2, 3, 8, 4, 7] [3, 2, 8, 4, 7] [8, 2, 3, 4, 7] [2, 8, 3, 4, 7] [4, 8, 2, 3, 7] [8, 4, 2, 3, 7] [2, 4, 8, 3, 7] [4, 2, 8, 3, 7] [8, 2, 4, 3, 7] [2, 8, 4, 3, 7] [4, 3, 2, 8, 7] [3, 4, 2, 8, 7] [2, 4, 3, 8, 7] [4, 2, 3, 8, 7] [3, 2, 4, 8, 7] [2, 3, 4, 8, 7] [4, 3, 8, 2, 7] [3, 4, 8, 2, 7] [8, 4, 3, 2, 7] [4, 8, 3, 2, 7] [3, 8, 4, 2, 7] [8, 3, 4, 2, 7] [7, 3, 8, 2, 4] [3, 7, 8, 2, 4] [8, 7, 3, 2, 4] [7, 8, 3, 2, 4] [3, 8, 7, 2, 4] [8, 3, 7, 2, 4] [2, 3, 8, 7, 4] [3, 2, 8, 7, 4] [8, 2, 3, 7, 4] [2, 8, 3, 7, 4] [3, 8, 2, 7, 4] [8, 3, 2, 7, 4] [2, 7, 8, 3, 4] [7, 2, 8, 3, 4] [8, 2, 7, 3, 4] [2, 8, 7, 3, 4] [7, 8, 2, 3, 4] [8, 7, 2, 3, 4] [2, 7, 3, 8, 4] [7, 2, 3, 8, 4] [3, 2, 7, 8, 4] [2, 3, 7, 8, 4] [7, 3, 2, 8, 4] [3, 7, 2, 8, 4] [4, 7, 3, 8, 2] [7, 4, 3, 8, 2] [3, 4, 7, 8, 2] [4, 3, 7, 8, 2] [7, 3, 4, 8, 2] [3, 7, 4, 8, 2] [8, 7, 3, 4, 2] [7, 8, 3, 4, 2] [3, 8, 7, 4, 2] [8, 3, 7, 4, 2] [7, 3, 8, 4, 2] [3, 7, 8, 4, 2] [8, 4, 3, 7, 2] [4, 8, 3, 7, 2] [3, 8, 4, 7, 2] [8, 3, 4, 7, 2] [4, 3, 8, 7, 2] [3, 4, 8, 7, 2] [8, 4, 7, 3, 2] [4, 8, 7, 3, 2] [7, 8, 4, 3, 2] [8, 7, 4, 3, 2] [4, 7, 8, 3, 2] [7, 4, 8, 3, 2]
Related posts:
Java Program to Use the Bellman-Ford Algorithm to Find the Shortest Path
Spring Boot - Zuul Proxy Server and Routing
REST Web service: HTTP Status Code và xử lý ngoại lệ RESTful web service với Jersey 2.x
Mệnh đề if-else trong java
Display Auto-Configuration Report in Spring Boot
Java Program to Implement Branch and Bound Method to Perform a Combinatorial Search
Inheritance with Jackson
Tránh lỗi NullPointerException trong Java như thế nào?
Java Program to Compute Discrete Fourier Transform Using Naive Approach
Jackson vs Gson
Getting Started with Stream Processing with Spring Cloud Data Flow
Java Program to Implement vector
Instance Profile Credentials using Spring Cloud
Java Program to Implement RenderingHints API
How to Get the Last Element of a Stream in Java?
Java Program to Implement Insertion Sort
Biến trong java
Spring Security Authentication Provider
Deque và ArrayDeque trong Java
LinkedList trong java
Java Program to Implement Find all Forward Edges in a Graph
Spring Security OAuth2 – Simple Token Revocation
Java Program to Implement Bubble Sort
Java Program to Implement Selection Sort
Java Program to Implement Johnson’s Algorithm
Consumer trong Java 8
Java Program to Find the Longest Path in a DAG
Hướng dẫn sử dụng Java Annotation
Uploading MultipartFile with Spring RestTemplate
Java Map With Case-Insensitive Keys
Java Deep Learning Essentials - Yusuke Sugomori
Build a REST API with Spring and Java Config