2741. Special Permutations
Problem Description
In this problem, we are given a zero-indexed array nums
that consists of n
distinct positive integers. We are asked to find the number of permutations of nums
that are "special." A permutation is considered special if it meets the following condition: for every adjacent pair of elements in the permutation (nums[i], nums[i+1])
where 0 <= i < n - 1
, the pair must satisfy either nums[i] % nums[i+1] == 0
or nums[i+1] % nums[i] == 0
. In other words, each adjacent pair must be such that one number is a divisor of the other. We need to return the total number of such special permutations modulo 10^9 + 7
to handle the large number that might result from the calculation.
Intuition
To solve this problem, we can use dynamic programming with bitmasking to handle the permutations efficiently. We consider each bit in a bitmask to represent whether a particular element of the array nums
has already been used in the permutation or not. Since nums
contains n
distinct elements, we can represent the state of the permutation using n
bits, which leads to a total of 2^n
states (m
in the code).
The main idea behind the solution is the following steps:
-
Initialize a 2D array
f
with dimensionsm * n
to store the number of ways to achieve a valid permutation using some of the elements ofnums
. The row represents the bitmask (which elements have been used), and the columnj
represents the last element used in the permutation. -
Loop through all possible bitmask states
i
, and for each, we calculate the number of valid special permutations ending with each elementx
(wherei
has thej
th bit set, indicating thatx
is the last element of the permutation). To do this:-
Find
ii
by subtracting the current elementx
from the bitmask, resulting in the bitmask of the rest of the elements. -
If
ii
equals zero, it means that this is the starting element of the permutation; setf[i][j]
to 1. -
Otherwise, iterate over the array again using index
k
and elementy
representing the second-to-last element in the permutation, if the current elementx
can dividey
or vice versa, increment the count inf[i][j]
by the number of ways you can form a permutation that ends withy
; update it asf[i][j] = (f[i][j] + f[ii][k]) % mod
.
-
-
After filling up the table, the sum of counts in the last row of
f
will give the total number of special permutations, because the last row represents the state where all elements have been used.
This dynamic programming approach effectively counts all valid permutations while ensuring that we do not revisit configurations we have already considered, which greatly optimizes the solution.
Learn more about Bitmask patterns.
Solution Approach
The solution provided uses dynamic programming and bitmasking to find the number of special permutations.
Here's the breakdown of the implementation:
-
First, the
mod
variable is set to10^9 + 7
to ensure all calculations are done under modulo arithmetic to prevent integer overflow. -
The variable
n
is assigned the length of thenums
array. Andm
is calculated as1 << n
, which equals2^n
and represents the total number of states each element can be in (used or unused). -
The
f
array is initialized as a two-dimensional list of sizem * n
, with all elements set to zero. This array holds the number of special permutations possible for each combination of elements. -
The outermost loop iterates over all possible states, represented by the bitmask
i
. The bitmaski
hasn
bits, with each bit corresponding to whether a particular number innums
has been included in the permutation (1
) or not (0
). -
Within the outer loop, we iterate over all elements
x
innums
with their corresponding indexj
. If thej
th bit of bitmaski
is set (i >> j & 1
), it indicates that numberx
is being considered as the last number in the permutation. -
For each such
x
, we calculateii
, which is the bitmask state withoutx
(done byi ^ (1 << j)
). -
If
ii
is zero (ii == 0
), it means we are considering permutations wherex
is the only number so far. Thus, there is only one way to form such a permutation andf[i][j]
is set to1
. -
If
ii
is not zero, we look at all other numbersy
innums
that could come beforex
in the permutation. We use the second-to-last number'sk
index to check divisibility betweeny
andx
(eitherx % y == 0
ory % x == 0
). If the divisibility condition is met, it meansy
can come beforex
in a permutation. We add the count of special permutations ending withy
(stored inf[ii][k]
) to the count of permutations ending withx
(f[i][j]
), applying modulo every time to keep numbers within bounds. -
After completing both loops, the array
f[-1]
contains counts of all special permutations for eachnums
element as the last number. The sum of all these counts gives us the total number of special permutations. The final result is taken modulo10^9 + 7
to get the answer within the required bounds.
This algorithm is efficient because it takes advantage of the structure of permutations and divisibility to prune the search space and count only valid special permutations, avoiding the need to generate and test every permutation explicitly, which would be impractical for large n
.
Ready to land your dream job?
Unlock your dream job with a 2-minute evaluator for a personalized learning plan!
Start EvaluatorExample Walkthrough
Consider an array nums
with distinct positive integers like [1, 2, 3]
. Let's walk through the solution approach using this set of numbers to understand how the dynamic programming and bitmasking technique is applied.
-
First, we set
n
equal to the length ofnums
, which in this case is3
. We calculatem
as1 << n
(which is2^n
), amounting to8
for this example because there are2^3
possible states for three distinct numbers. -
Initialize the DP array
f
with sizem * n
. In this case,f
will be an 8 by 3 array filled initially with zeros. The state off
will look as follows after initialization, wheref[i][j]
represents the number of ways to form permutations of sizei
withj
as the last number:f = [ [0, 0, 0], // state 0: no elements used [0, 0, 0], // state 1: only num[0] used [0, 0, 0], // state 2: only num[1] used [0, 0, 0], // state 3: num[0] and num[1] used [0, 0, 0], // state 4: only num[2] used [0, 0, 0], // state 5: num[0] and num[2] used [0, 0, 0], // state 6: num[1] and num[2] used [0, 0, 0], // state 7: all numbers used ]
-
Start iterating over all possible states (
i
) from1
tom - 1
. For each statei
, we look for all numbersx
innums
that could potentially be the last number in the permutation. -
For each number
x
(with indexj
), ifx
is included in statei
(checked byi >> j & 1
), we calculate the stateii
by removingx
fromi
(viai ^ (1 << j)
). -
If
ii
is 0, we know thatx
is at the start of the permutation, hencef[i][j]
is set to1
. -
If
ii
is not 0, check all numbersy
(with indexk
) that are notx
and occur beforex
in the permutation. Ifx
dividesy
ory
dividesx
, add the number of permutations that end withy
(f[ii][k]
) to the current permutation count (f[i][j]
).
Applying this process to our example, let's consider the state where i = 3
(binary 011
), which means nums[0]
(value 1
) and nums[1]
(value 2
) are included. Since 1
is a divisor of 2
, we can form a permutation [1, 2]
. Thus, f[3][1]
(where 3 represents the state 011
and 1 represents index of number 2
in nums
) will increment by 1. Iterate this procedure for each state and number pair.
Once the table is filled, sum up the last row's values to get the total number of special permutations. For our example, f[7]
(which represents all numbers being used) yields the count for each number as the last in a special permutation. Since all numbers in nums
are divisible by 1, any permutation where 1
is the first element will be valid, leading to the total count being the sum of the last row of f
modulo 10^9 + 7
.
This small example demonstrates the use of dynamic programming and bitmasking for efficiently calculating the number of special permutations. Each state is systematically built upon the previous states, ensuring that all permutations are accounted for and that each permutation is valid according to the given divisibility condition.
Solution Implementation
1class Solution:
2 def specialPerm(self, nums: List[int]) -> int:
3 mod = 10**9 + 7 # Modulus for keeping values within integer limits
4 num_count = len(nums) # Total number of elements in nums
5 bitmask_limit = 1 << num_count # Compute the limit for bitmask (2^n combinations)
6 dp = [[0] * num_count for _ in range(bitmask_limit)] # Initialize the dynamic programming table
7
8 # Build the dynamic programming table
9 for bitmask in range(1, bitmask_limit): # Loop over all possible combinations
10 for j, x in enumerate(nums): # Iterate over numbers in nums with index j
11 if bitmask >> j & 1: # Check if element at index j is included in the combination
12 prev_bitmask = bitmask ^ (1 << j) # Calculate bitmask of the previous state
13 if prev_bitmask == 0: # If it's the first number in the combination
14 dp[bitmask][j] = 1 # There is one way to pick it
15 continue
16 # Calculate number of special permutations ending with the number at index j
17 for k, y in enumerate(nums): # Iterate over all other numbers with index k
18 if x % y == 0 or y % x == 0: # Check if x and y are in a special relation
19 dp[bitmask][j] = (dp[bitmask][j] + dp[prev_bitmask][k]) % mod
20 # The answer is the sum of all permutations ending with any number in nums
21 return sum(dp[-1]) % mod # Return the sum of permutations for the final state
22
1class Solution {
2 public int specialPerm(int[] nums) {
3 final int MOD = (int) 1e9 + 7; // Define the modulus for the output to prevent overflow
4 int n = nums.length; // Store the length of the input array
5 int m = 1 << n; // Calculate 2^n, which will be used for creating subsets
6 int[][] dp = new int[m][n]; // Create a dp table for memoization
7
8 // Iterate over all subsets of the given array
9 for (int i = 1; i < m; ++i) {
10 // Iterate over each number in the current subset
11 for (int j = 0; j < n; ++j) {
12 // Check if the j-th number is in the current subset
13 if ((i >> j & 1) == 1) {
14 int prevSubset = i ^ (1 << j); // Create the previous subset by removing j-th number
15 if (prevSubset == 0) {
16 dp[i][j] = 1; // If the subset is empty, initialize with 1
17 continue;
18 }
19 // Iterate over each number in the previous subset
20 for (int k = 0; k < n; ++k) {
21 // Apply the given condition (nums[j] % nums[k] == 0 or nums[k] % nums[j] == 0)
22 if (nums[j] % nums[k] == 0 || nums[k] % nums[j] == 0) {
23 // Update the dp table using the results from the previous subset
24 dp[i][j] = (dp[i][j] + dp[prevSubset][k]) % MOD;
25 }
26 }
27 }
28 }
29 }
30
31 int answer = 0; // Initialize the answer
32
33 // Sum up all possibilities for the full set
34 for (int x : dp[m - 1]) {
35 answer = (answer + x) % MOD;
36 }
37
38 return answer; // Return the calculated answer
39 }
40}
41
1class Solution {
2public:
3 int specialPerm(vector<int>& nums) {
4 const int MOD = 1e9 + 7; // Constant to hold the modulo value
5 int n = nums.size(); // Size of the input vector
6 int upperBound = 1 << n; // Equivalent to 2^n, decides the upper bound for bitmasking
7 int dp[upperBound][n]; // 2D array for dynamic programming
8 memset(dp, 0, sizeof(dp)); // Initialize the array with zeros
9
10 // Loop through all bitmask possibilities (from 1 to 2^n - 1)
11 for (int mask = 1; mask < upperBound; ++mask) {
12 // Iterate over each number in nums
13 for (int j = 0; j < n; ++j) {
14 // Check if the j-th number is included in the current combination (mask)
15 if ((mask >> j & 1) == 1) {
16 int prevMask = mask ^ (1 << j); // Calculate previous mask by removing j-th bit
17
18 if (prevMask == 0) {
19 dp[mask][j] = 1; // Base case for DP: only one number in the sequence
20 continue;
21 }
22
23 // Iterate over each possibility for the previous number in the sequence
24 for (int k = 0; k < n; ++k) {
25 // Check if the current and previous numbers are compatible (divisible)
26 if (nums[j] % nums[k] == 0 || nums[k] % nums[j] == 0) {
27 // If they are, increment the DP value for the current combination and number
28 dp[mask][j] = (dp[mask][j] + dp[prevMask][k]) % MOD;
29 }
30 }
31 }
32 }
33 }
34
35 // Calculate the final answer by summing up the valid sequences ending with each number
36 int answer = 0;
37 for (int val : dp[upperBound - 1]) { // Iterate over the last row of the DP array
38 answer = (answer + val) % MOD; // Accumulate values considering the modulo
39 }
40
41 // Return the computed answer
42 return answer;
43 }
44};
45
1// Defining constants and utility functions
2const MOD = 1e9 + 7;
3
4// Utility function to count the set bits in a bitmask
5function countSetBits(mask: number): number {
6 let count = 0;
7 while (mask) {
8 count += mask & 1;
9 mask >>= 1;
10 }
11 return count;
12}
13
14// Dynamic programming function to calculate the special permutation count
15function specialPerm(nums: number[]): number {
16 const n: number = nums.length;
17 const upperBound: number = 1 << n;
18 let dp: number[][] = new Array(upperBound).fill(null).map(() => new Array(n).fill(0));
19
20 // Iterate through all bitmask possibilities (from 1 to 2^n - 1)
21 for (let mask = 1; mask < upperBound; ++mask) {
22 // Iterate over each number in nums
23 for (let j = 0; j < n; ++j) {
24 // Check if the j-th number is included in the current combination (mask)
25 if ((mask >> j & 1) === 1) {
26 let prevMask = mask ^ (1 << j); // Calculate previous mask by removing j-th bit
27
28 if (prevMask === 0) {
29 dp[mask][j] = 1; // Base case for DP: only one number in the sequence
30 continue;
31 }
32
33 // Iterate over each possibility for the previous number in the sequence
34 for (let k = 0; k < n; ++k) {
35 // Check if the current and previous numbers are compatible (divisible)
36 if (nums[j] % nums[k] === 0 || nums[k] % nums[j] === 0) {
37 // If they are, increment the DP value for the current combination and number
38 dp[mask][j] = (dp[mask][j] + dp[prevMask][k]) % MOD;
39 }
40 }
41 }
42 }
43 }
44
45 // Calculate the final answer by summing up the valid sequences ending with each number
46 let answer = 0;
47 for (let val of dp[upperBound - 1]) {
48 answer = (answer + val) % MOD; // Accumulate values considering the modulo
49 }
50
51 // Return the computed answer
52 return answer;
53}
54
55// Example usage:
56// const nums = [1, 2, 3];
57// console.log(specialPerm(nums)); // Output the number of special permutations
58
Time and Space Complexity
The given Python function specialPerm
calculates a special permutation count under certain constraints. We'll analyze the time and space complexity of this function.
Time Complexity
The function involves multiple nested loops:
- The outermost loop runs through all subsets of indices formed from the
nums
array, having a total of2^n
iterations (n
is the length ofnums
), becausem = 1 << n
which is2^n
. - The second loop iterates over each element in
nums
, contributing a factor ofn
. - The innermost loop runs conditionally when the bit at position
j
is set in the current subseti
(i >> j & 1
). When this condition is met, it attempts to iterate overnums
again to updatef[i][j]
. However, this does not bring another factor ofn
because it will only iterate up ton
times in the worst-case scenario, not for each subset or combination.
Considering the bit manipulation operations and modulo operations inside the loops are constant time, the time complexity is derived primarily from these loops.
Therefore, the total time complexity is O(n * 2^n)
since the two significant factors are the iterations over the subsets (2^n
) and the elements in nums
(n
).
Space Complexity
The space usage in the function comes from:
- The list
f
: a 2D list of dimensions2^n
byn
. It holds the count of permutations that end with each elementj
for all subsets ofnums
. - Auxiliary space: negligible constant space used for loop indices and temporary variables.
The space complexity is thus determined by the size of f
, which is O(n * 2^n)
.
In conclusion, the function has a time complexity of O(n * 2^n)
and a space complexity of O(n * 2^n)
.
Learn more about how to find time and space complexity quickly using problem constraints.
Which data structure is used in a depth first search?
Recommended Readings
Bitmask and Dynamic Programming Bit manipulation is a crucial aspect of computer programming and one of the most powerful tools for bit manipulation is bitmasks Let's first understand what a bit is A bit is a binary digit It's the smallest piece of data in a computer and can be
LeetCode Patterns Your Personal Dijkstra's Algorithm to Landing Your Dream Job The goal of AlgoMonster is to help you get a job in the shortest amount of time possible in a data driven way We compiled datasets of tech interview problems and broke them down by patterns This way we
Recursion Recursion is one of the most important concepts in computer science Simply speaking recursion is the process of a function calling itself Using a real life analogy imagine a scenario where you invite your friends to lunch https algomonster s3 us east 2 amazonaws com recursion jpg You first
Want a Structured Path to Master System Design Too? Don’t Miss This!