| Bytes | Lang | Time | Link |
|---|---|---|---|
| 004 | BQN | 250909T214958Z | DLosc |
| 011 | Pip | 210923T222403Z | DLosc |
| 025 | AWK | 250829T152106Z | xrs |
| 036 | Nibbles | 230728T115110Z | Dominic |
| 048 | Zsh | 230728T105135Z | roblogic |
| 005 | 05AB1E | 230728T073150Z | Kevin Cr |
| 038 | Arturo | 230728T064518Z | chunes |
| 011 | K ngn/k | 230728T020233Z | Bubbler |
| 004 | Nekomata + 1 | 230728T013219Z | alephalp |
| 029 | JavaScript Node.js | 210926T102259Z | l4m2 |
| 048 | C# | 221010T100356Z | Acer |
| nan | 221007T203411Z | bigyihsu | |
| 018 | K ngn/k | 221007T080809Z | oeuf |
| 046 | Gema | 221006T210208Z | manatwor |
| 004 | Vyxal | 221006T173944Z | pacman25 |
| 008 | MATL | 170730T212554Z | Luis Men |
| 022 | x8616 machine code | 210920T133827Z | 640KB |
| 032 | TIBasic | 210925T111751Z | MarcMush |
| 039 | TIBasic | 210924T163309Z | Youserna |
| 005 | Japt æ | 210923T212005Z | Shaggy |
| 021 | Factor | 210923T211340Z | chunes |
| 050 | C gcc | 180428T172103Z | l4m2 |
| 069 | Add++ | 180428T143250Z | user8021 |
| 034 | Haskell | 180327T092141Z | Laikoni |
| 004 | Husk | 171130T191315Z | ბიმო |
| 047 | Python 3 | 171130T173939Z | pizzapan |
| 021 | Alice | 171130T161501Z | Martin E |
| 012 | K4 | 171130T153323Z | mkst |
| 005 | Brachylog | 171130T094417Z | Zgarb |
| 004 | Jelly | 171129T155322Z | Erik the |
| 104 | APL NARS 52 char | 171129T141655Z | user5898 |
| 113 | Python 2 | 170802T112200Z | Koishore |
| nan | 170731T111226Z | SchoolBo | |
| 032 | PHP | 170803T114158Z | aross |
| 081 | JavaScript Node.js | 170813T040152Z | Doug Cob |
| 093 | PowerShell | 170813T014047Z | Doug Cob |
| 098 | C gcc | 170811T153049Z | Marcos |
| 109 | Java OpenJDK 8 | 170810T142634Z | Xanderha |
| 065 | Python 2 | 170810T051107Z | anon |
| nan | Python 2 | 170810T065110Z | Wheat Wi |
| nan | Perl 5 | 170804T230708Z | Xcali |
| 011 | Dyalog APL | 170730T213453Z | Adalynn |
| 036 | Ruby | 170804T075113Z | Value In |
| 024 | Retina | 170730T230538Z | Neil |
| 015 | APL | 170802T131131Z | Moris Zu |
| 011 | APL Dyalog | 170804T050403Z | Adá |
| 020 | APL Dyalog | 170731T111324Z | Adá |
| 016 | 05AB1E | 170803T160040Z | Magic Oc |
| 067 | C# | 170801T085735Z | Caius Ja |
| nan | PROLOG SWI | 170802T141339Z | Nathan.E |
| 018 | Dyalog APL Classic | 170802T110313Z | lstefano |
| 069 | Haskell | 170731T094739Z | jferard |
| 035 | Haskell | 170731T121130Z | lynn |
| 012 | J | 170801T052457Z | miles |
| 034 | Python 2 | 170730T212650Z | musicman |
| nan | 170731T164929Z | Brad Gil | |
| 028 | R | 170731T073532Z | djhurio |
| 016 | J | 170731T064429Z | bob |
| 054 | Javascript | 170731T110450Z | SuperSto |
| 034 | R | 170731T095112Z | RoryT |
| 145 | C# | 170731T093256Z | TheLetha |
| nan | Axiom 96 | 170731T083402Z | user5898 |
| 092 | Python 3 | 170731T060041Z | Leaky Nu |
| 005 | Pyth | 170731T013249Z | izzyg |
| 005 | Jelly | 170731T003249Z | Dennis |
| 007 | Japt | 170730T222738Z | ETHprodu |
| 025 | JavaScript ES6 | 170730T212337Z | Arnauld |
| 024 | Mathematica | 170730T220724Z | JungHwan |
| 006 | Jelly | 170730T214616Z | miles |
BQN, 4 bytes
⊑⊒⊸/
Explanation
⊑⊒⊸/
/ Repeat each element by
⊒⊸ Its occurrence count (i.e. how many times it has appeared previously)
For our purposes, this has the effect of removing the first occurrence
of each element
⊑ Get the first remaining element
Pip, 13 11 bytes
@:g@?B<_FEg
Takes the numbers as separate command-line arguments. If there are no duplicates, outputs nil. Attempt This Online!
Explanation
@:g@?B<_FEg
g List of command-line arguments
FE Filter by this function, with the index and item as arguments:
@? The index of the first occurrence of
B The current item
g In g
< Is less than
_ The current index
(I.e. this is not the current item's first occurrence)
@: Get the first element of the filtered list
AWK, 25 bytes
{for(;!b[$++i]++;);}$0=$i
If duplicate found prints number, no duplicate prints nothing.
Nibbles, 3 bytes (6 nibbles)
/-$`$$
Outputs 0 if there are no duplicated elements.
/-$`$$
- # remove
`$ # unique elements of
$ # input
$ # from the input
# (this leaves only duplicated elements,
# in their original order);
/ # get the first element
# (actually, fold returning left-hand element at each step,
# but result is to return left-most element)
5 bytes to instead return -1 when there are no duplicated elements, as in the example and initial spec: /:-$`$$-1
Zsh, 48 bytes
for n;A+=($@[(in:2:)$n]);<<<$@[`printf ${(o)A}`]
Input is via argument array $@.
A is an array of indexes of secondary duplicates.
printf ${(o)A} sorts A leaving only the lowest index.
<<<$@[ ] prints the argument at that index.
05AB1E, 5 bytes
.ΔkNÊ
Outputs -1 if there are no duplicated items, like in the challenge examples.
Try it online or verify both test cases.
Explanation:
.Δ # Find the first element in the (implicit) input-list where the following is
# truthy, or -1 if none are truthy:
k # Get the first index of the current integer in the (implicit) input-list
NÊ # Check whether it's NOT equal to the current find_first index
# (after which the result is output implicitly as result)
Arturo, 38 bytes
$->a[0-1select.n:1a=>[in?&take a<=1+]]
$->a[ ; a function taking an arg a
0-1 ; push -1
select.n:1a=>[ ; select the first elt in a that
in?& ; is the current elt in
<=1+ ; increment stack and duplicate
take a ; take that many of the first elts in a
] ; end select
] ; end function
K (ngn/k), 11 bytes
*(~':?',\)#
*(~':?',\)#
( )# keep the elements where the left function returns true
(when applied to the whole array):
,\ prefixes
?' uniquify each
~': is it the same as previous?
* first element
Nekomata + -1, 4 bytes
pƆᵗf
pƆᵗf
p Find a prefix of the input
Ɔ Split it into the last element and the rest
ᵗf Check if the last element is in the rest, and return it if it is
-1 prints the first possible result, or nothing if there is no result.
JavaScript (Node.js), 29 bytes
x=>x.find(z=>(x[~z]+={})[25])
No effort on bonus at all
-1 from SuperStormer
C#, 48 bytes
x=>x.Where((_,i)=>x[..i].Contains(x[i])).First()
Alternative without LINQ, 58 bytes
x=>{for(int i=0;;)if(x[..++i].Contains(x[i]))return x[i];}
Go, 97 bytes, \$O(n)\$ time, \$O(n)\$ space
func (l[]int)int{m:=make(map[int]int)
for i,e:=range l{if _,o:=m[e];o{return e}
m[e]=i}
return-1}
Goes over the input slice exactly once per element. The map stores a pair per element, meaning \$O(n)\$ space as well.
K (ngn/k), 18 bytes
{x@({+/y=x}':x)?1}
A little bit lengthy, but works nonetheless. I still can't fully understand how this even works (especially the counting duplicates section) and I'm on mobile, so explanations will be edited later.
Gema, 46 characters
<N>=@cmpn{${$0;};;;;$0@end}@set{$0;1}
?=
\Z=-1
Sample run:
bash-5.1$ gema '<N>=@cmpn{${$0;};;;;$0@end}@set{$0;1};?=;\Z=-1' <<< '[2, 3, 3, 1, 5, 2]'
3
bash-5.1$ gema '<N>=@cmpn{${$0;};;;;$0@end}@set{$0;1};?=;\Z=-1' <<< '[2, 4, 3, 5, 1]'
-1
Vyxal, 4 bytes
UÞ⊍h
Takes the multi-set symmetric difference, which outputs the duplicate values in order that they occur. Outputs 0 if nothing is found.
MATL, 8 bytes
&=Rsqf1)
Gives an error (without output) if no duplicate exists.
Try at MATL Online!
Explanation
&= % Implict input. Matrix of all pairwise equality comparisons
R % Keep the upper triangular part (i.e. set lower part to false)
s % Sum of each column
q % Subtract 1
f % Indices of nonzero values
1) % Get first. Gives an error is there is none. Implictly display
x86-16 machine code, 22 bytes
00000000: 33c0 9992 d792 d7d7 3bc2 75f7 33c0 d792 3.......;.u.3...
00000010: d73b c275 f9c3 .;.u..
Listing:
33 C0 XOR AX, AX ; AL = 0, starting hare position
99 CWD ; DL = 0, starting tortoise position
L1:
92 XCHG AX, DX ; swap t/h in AL
D7 XLAT ; tortoise crawl to next
92 XCHG AX, DX ; swap t/h in AL
D7 XLAT ; hare hops
D7 XLAT ; hare hops again
3B C2 CMP AX, DX ; did they land on same element?
75 F7 JNZ L1 ; loop if not
33 C0 XOR AX, AX ; start tortoise at beginning to find first index match
L2:
D7 XLAT ; tortoise crawls
92 XCHG AX, DX ; swap t/h in AL
D7 XLAT ; hare hops
3B C2 CMP AX, DX ; did they land on same element?
75 F9 JNZ L2 ; loop if not
C3 RET ; return to caller
The old Tortoise and Hare (cycle detection) algorithm... using as many 1 byte opcodes as possible.
- Time complexity: O(2n), linear
- Space complexity: O(1) (uses no additional memory - all work done in CPU registers)
As a callable function, input pointer to list at [BX], output index in AL.
Test results using DOS DEBUG:
TI-Basic, 32 bytes
Prompt A
Repeat 2=Ans(I
I+1→I
cumSum(ʟA=ʟA(I
End
ʟA(I
needs a fresh interpreter or I initialized to 0. Will error if there is no duplicates
TI-Basic, 39 bytes
Prompt A
ʟA
Ans(1+sum(not(cumSum(seq(I≠1+sum(not(cumSum(Ans=Ans(I)))),I,1,dim(Ans
Output is stored in Ans and is displayed at the end. Throws an error if there are no duplicates.
Factor, 21 bytes
[ duplicates ?first ]
Returns f in case the input has no duplicates. This is idiomatic for Factor rather than -1. Let me know if that's not allowed and I can fix it (i.e. make it much longer).
duplicatesReturn only the elements that repeat in a sequence (in order).?firstReturn the first element of a sequence orfif the sequence is empty.
C (gcc), 50 bytes
g;main(i){scanf("%d",&i);return i[&g]++?i:main();}
C (gcc), 51 bytes
g;main(i){for(;scanf("%d",&i),i[&g]^=1;);return i;}
C (gcc), 56 bytes
g;main(i){scanf("%d",&i);i[&g]++?printf("%d",i):main();}
Add++, 69 bytes
D,k,@@*,BF€=B]ßEB*MVcGA$p
D,w,@@,BF€=s1<
D,l,@~,$
L~,AÞwB]dVbUG€k»lbU
How it works
Oddly enough, despite Add++ having a deduplicate command, this doesn't use it. This exits with an error code of 1 when there is no duplicated element.
We start by removing any elements without more than one occurrence, in order to leave the stack with an array containing the original array, preserving order, without any elements which only occur once. This is done by the use of filtering by the dyadic function w:
D,w,@@,BF€=s1<
L~,AÞw
Here, the lambda is implicitly called with the argument. The ~ tells it to unpack its argument to the stack beforehand, then the A pushes the argument to the stack. Thesefore, if the input looks like [a b c a c], the stack would look like
[a b c a c [a b c a c]]
We want this structure, called dyad-binding, due to the way the filter-keep quick, Þ, works in regard to non-monadic arguments. Here, its functional argument is w, a dyadic (two argument) function. This means that, instead of filtering over each element in the stack using w, it pops the top element of the stack, the list [a b c a c] in this case, and uses that as the right argument when filtering every other element.
So, for one iteration of w, the stack may look like this at the start of execution:
[[a b c a c] a]
Then BF flattens the stack, and then we come to another dyadic quick: €. Again, the popping behaviour is simulated, and a is used as the left argument to the succeeding function, the equality operator in this case. This compares a with the elements of [a b c a c], yielding an array of 1s and 0s. By now, the stack looks something like this
[1 0 0 1 0]
Finally, s takes the sum, and 1< asserts that it is greater than 1. This essentailly counts the occurences of each element of the input in the input itself, and removes them if the count is only 1 i.e. the element isn't duplicated at some point.
After applying Þw to the input, the stack results in
[a c a c]
We'll call this array A. The rest of the code is determining which of these remaining elements occurs for the second time first i.e. the actual task in the challenge.
Next, we want to perform k over the remaining list. In order to do this, with k being dyadic and taking A as its left argument. Again, we want to create the dyad-binding structure, but using the elements of A instead of the arguments. In a general case, if the stack looks like [a b c d e], where a - e are arbitrary pieces of data, the following code will convert that into a dyad-binding structure:
B]dVbUG
So, this makes our stack look like [a c a c [a c a c]], before calling k over €ach of the elements, using the array as the left argument.
D,k,@@*,BF€=B]ßEB*MVcGA$p
k is our main function to isolate the first deduplicated element. Here, we have our two arguments, I, the element in the array being iterated over, and A, our array containing the elements that occur more than once. The first part of the code, BF€=, identifies which elements of A are equal to I. Now, we generate the truthy indices - the indices of elements in A that are equal to I. There is a bug in ßE, causing it to start from 0 (corrected after the challenge was posted). However, as this means the first occurence if I will always be set to 0 because of this bug, and the offset of 1 doesn't change between elements, this means that we can avoid the lengthier dbLBc which is bug free. Let's use a as an example value for I. Now, our stack resembles
[[0 1] [1 0] [2 1] [3 0]]
The first element is the 0-based index i, the second whether or not I = A[i]. Next, we remove the indexes where I ≠ A[i], by taking the product of each pair with B*, then taking the maximum value with MVcG. Finally, we push I to the stack and pair them as a list. With I as a, the final value returned is:
[2 a]
This process happens over each element of A, eventually leading to a series of paired lists of the highest index of the element of A in A itself. Finally we want to find the element which has the lowest first element, the element whose duplcicate appears first. Here, as Add++ doesn't have a builtin to get the first or last element of a list, we use our third helper function l:
D,l,@~,$
L~,…»l…
While Add++ doesn't have a builtin for head of an array, it does have a minimum-by quick, ». We take the list which has the minimum return value when passed through the function l. This helper function unpacks its argument to the stack before performing any commands with the ~ command, then $ swaps them, so the index comes first and is the value returned. Essentially, we return the element with the smallest duplicated element.
Unfortunately, this returns the entire array, both the index and the element, rather than just the element, so we append a bU to unpack this array to the stack, returning only the last element of the pair - the first duplicated element.
Haskell, 34 bytes
import Data.List
f x=head$x\\nub x
Try it online! For an input x = [2,3,3,1,5,2], nub x removes duplicates [2,3,1,5] and x\\nub x removes the elements of nub x from x, thus keeping the duplicates [3,2]. head returns the first element of hat list.
Point-free is the same byte count: head.((\\)<*>nub).
Husk, 4 bytes
←Ṡ-u
Returns 0 if no input contains no duplicate, try it online!
Explanation
←Ṡ-u -- takes a list X as input & returns 0 or first duplicate
Ṡ- -- compute X - ...
u -- ... deduplicate X
← -- get first element or 0 if empty
Alice, 21 bytes
/o/
\iHQ@/w].(?~!&WK?
Explanation
The main idea is to store each value we've encountered on the tape and then use the search command to check whether the current value has already been written to the tape. It's important here that the tape is initially completely filled with -1s.
/ Switch to Ordinal mode.
i Read all input as a string.
/ Switch back to Cardinal mode.
H Take the absolute value of the top stack element. This doesn't really do
anything to the numbers, because they're all positive anyway, but
it forces Alice to convert the input string to individual integer
values it contains, thus splitting the string.
/ Switch to Ordinal mode.
Q Reverse the stack so that the first input is on top.
/ Switch back to Cardinal mode.
w Push the current IP position onto the return address stack. This marks
the beginning of the main loop.
Call the current value on top of the stack X.
] Advance the tape head (unnecessary on the first iteration, but
we need to do it between iterations).
. Duplicate X.
( Search left of the tape head for X. If X isn't found nothing happens
and we remain on a -1. Otherwise, the tape head jumps to that
earlier occurrence.
? Retrieve the value under the tape head. If X is new, this will be
-1. Otherwise, it will be X. Call this value Y.
~! Store X in the current cell.
&W Discard Y values from the return address stack. If Y is negative,
this does nothing, otherwise it discards the one return address we
have there, terminating the loop.
$K If the return address is still there, jump back to the w to process
the next element. Otherwise continue.
? Retrieve X.
\ Switch to Ordinal mode.
o Output the result.
H Trim, does nothing.
@ Terminate the program.
I've got an alternative solution at the same byte count:
/o/
\iHQ@/w.!(]?h$WK[?
I also had a solution where I used the tape as a lookup table, storing at each index X whether X had already been seen in the sequence, but it ended up being a byte longer (it's conceptually easier, but moving the tape head to position X from an arbitrary positive position requires five bytes with q&[&]).
K4, 12 bytes
Solution:
*<0W^*:'1_'=
Example:
*<0W^*:'1_'=2 3 3 1 5 2
3
Explanation:
Returns first item in the list for unique lists otherwise returns first dupe:
*<0W^*:'1_'= / the solution
= / group the list, e.g. 2 3 1 5!(0 5;1 2;,3;,4)
1_' / drop first from each value, e.g. 2 3 1 5!(,5;,2;`long$();`long$())
*:' / first (*:) each ('), e.g. 2 3 1 5!5 2 0N 0N
0W^ / fill (^) nulls with infinity (0W), e.g. 2 3 1 5!5 2 0W 0W
< / sort keys based on values, e.g. 3 2 1 5
* / take the first, e.g. 3
Brachylog, 5 bytes
a⊇=bh
Explanation
a⊇=bh Input is a list.
a There is an adfix (prefix or suffix) of the input
⊇ and a subsequence of that adfix
= whose elements are all equal.
b Drop its first element
h and output the first element of the rest.
The adfix built-in a lists first all prefixes in increasing order of length, then suffixes in decreasing order of length.
Thus the output is produced by the shortest prefix that allows it, if any.
If a prefix has no duplicates, the rest of the program fails for it, since every subsequence of equal elements has length 1, and the first element of its tail doesn't exist.
If a prefix has a repeated element, we can choose the length-2 subsequence containing both, and the program returns the latter.
APL NARS 52 char 104 bytes
f←{1≠⍴⍴⍵:¯1⋄v←(⍵⍳⍵)-⍳⍴⍵⋄m←v⍳(v<0)/v⋄m≡⍬:¯1⋄(1⌷m)⌷⍵}
comments (for me f could return results even for vectors of characters that here seems to be the old strings)
1≠⍴⍴⍵:¯1 if ⍵ has rank different from 1 than it is not a vector so return -1
v←(⍵⍳⍵)-⍳⍴⍵ v is 0 0 0...0 only if there are not repetitions, else there is some value <0
m←v⍳(v<0)/v m return the indices j of v where v[j]<0, and so ⍵[j] are all the duplicates
m≡⍬:¯1 if m is void than that index not exist, so no duplicate and return -1
(1⌷m)⌷⍵ else return the value in ⍵ of the first element of m
results
f 1
¯1
f 1,2,3,4
¯1
f 1 2 3 3
3
f 2 3 3 1 5 2
3
f ,1
¯1
Python 2, 115 113 bytes
a,i,k=input(),0,[]
while 1:
if i==len(a):print-1;break
elif a[i]not in k:k+=[a[i]]
else:print a[i];break
i+=1
Java 8, 82 78 76 bytes No longer viable, 75 67 64 bytes below in edit
As a lambda function:
a->{Set<Long>s=new HashSet<>();for(long i:a)if(!s.add(i))return i;return-1;}
Probably can be made much smaller, this was very quick.
Explanation:
a->{ //New lambda function with 'a' as input
Set<Long>s=new HashSet<>(); //New set
for(long i:a) //Iterate over a
if(!s.add(i)) //If can't add to s, already exists
return i; //Return current value
return-1; //No dupes, return -1
}
*Edit*
75 67 64 bytes using the negation strategy:
a->{int i=0,j;while((a[j=Math.abs(a[i++])-1]*=-1)<0);return++j;}
(-3 bytes thanks to @Nevay)
Explanation:
a->{ //New lambda expression with 'a' as input
int i=0,j; //Initialise i and declare j
while((a[j=Math.abs(a[i++])-1]*=-1)<0); //Negate to keep track of current val until a negative is found
return++j; //Return value
}
Loops over the array, negating to keep track. If no dupes, just runs over and throws an error.
Both of these work on O(n) time and O(n) space complexity.
PHP, 56 44 38 32 bytes
for(;!${$argv[++$x]}++;);echo$x;
Run like this:
php -nr 'for(;!${$argv[++$x]}++;);echo$x;' -- 2 3 3 1 5 2;echo
> 3
Explanation
for(
;
!${ // Loop until current value as a variable is truthy
$argv[++$x] // The item to check for is the next item from input
}++; // Post increment, the var is now truthy
);
echo $x; // Echo the index of the duplicate.
Tweaks
- Saved 12 bytes by using variables instead of an array
- Saved 6 bytes by making use of the "undefined behavior" rule for when there is no match.
- Saved 6 bytes by using post-increment instead of setting to 1 after each loop
Complexity
As can be seen from the commented version of the code, the time complexity is linear O(n). In terms of memory, a maximum of n+1 variables will be assigned. So that's O(n).
JavaScript (Node.js), 81 bytes
Time complexity is O(n) !!!!
Space complexity is O(1) !!!!
a=>a.reduce((r,e,i)=>r?r:(a[(e<0?~e:e)-1]>0?((a[(e<0?~e:e)-1]^=-1)?0:0):i+2),0)-1
Strategy
This algorithm leverages the fact that indexes are positive but numbers in javascript are signed. Also, zeros are not allowed input. As long as the array is not longer than 2^31, this solution will work. I double the use of the original array as my lookup array -- marking a visited number by switching the value at that index with its 2's compliment.
PowerShell, 93 bytes
$c=0..$a.Count;$i=0;$r=($a|%{$i++;if($c[$_]++ -ne $_){$i}});if($r.Count -gt 0){$r[0]}else{-1}
C (gcc), 98 bytes
0-indexed
Takes a space separated list of integers. returns i < n on a successful match and i == n on failure.
time complexity is O(n^2) yuck!
space complexity is O(1)
program-name.exe 58 77 57 7 75 44 29 97 92 59 36 52 95 87 44 24 47 18 34 22
Returns 14 (the two 44s)
Golfed
i=1,j;main(int c,char**v){for(;i<c;i++)for(j=i-1;j;j--)if(!strcmp(v[i],v[j]))goto f;f:return i-1;}
Ungolfed
i=1,j;
main(int c, char**v){
for(;i < c; i++)
for(j=i-1; j; j--)
if(!strcmp(v[i], v[j]))
goto f;
f:
return i-1;
}
Java (OpenJDK 8), 65 117 109 bytes
Previous 65 byte solution:
r->{for(int a,b=0,z,i=0;;b=a)if((a=b|1<<(z=r[i++]))==b)return z;}
New solution. 19 bytes are included for import java.math.*;
-8 bytes thanks to @Nevay
r->{int z,i=0;for(BigInteger c=BigInteger.ZERO;c.min(c=c.setBit(z=r[i++]))!=c;);return z;}
Edit
The algorithm in my original program was fine, but the static size of the datatype used meant that it broke fairly quickly once the size went above a certain threshold.
I have changed the datatype used in the calculation to increase the memory limit of the program to accommodate this (using BigInteger for arbitrary precision instead of int or long). However, this makes it debatable whether or not this counts as O(1) space complexity.
I will leave my explanation below intact, but I wish to add that I now believe it is impossible to achieve O(1) space complexity without making some assumptions.
Proof
Define N as an integer such that 2 <= N .
Let S be a list representing a series of random integers [x{1}, ..., x{N}], where x{i} has the constraint 1 <= x{i} <= N.
The time complexity (in Big-O notation) required to iterate through this list exactly once per element is O(n)
The challenge given is to find the first duplicated value in the list. More specifically, we are searching for the first value in S that is a duplicate of a previous item on the list.
Let p and q be the positions of two elements in the list such that p < q and x{p} == x{q}. Our challenge becomes finding the smallest q that satisfies those conditions.
The obvious approach to this problem is to iterate through S and check if our x{i} exists in another list T:
If x{i} does not exist in T, we store it in T.
If x{i} does exist in T, it is the first duplicate value and therefore the smallest q, and as such we return it.
This space efficiency is O(n).
In order to achieve O(1) space complexity while maintaining O(n) time complexity, we have to store unique information about each object in the list in a finite amount of space. Because of this, the only way any algorithm could perform at O(1) space complexity is if:
1. N is given an upper bound corresponding to the memory required to store the maximum number of possible values for a particular finite datatype.
2. The re-assignment of a single immutable variable is not counted against the complexity, only the number of variables (a list being multiple variables).
3. (Based on other answers) The list is (or at least, the elements of the list are) mutable, and the datatype of the list is preset as a signed integer, allowing for changes to be made to elements further in the list without using additional memory.
1 and 3 both require assumptions and specifications about the datatype, while 2 requires that only the number of variables be considered for the calculation of space complexity, rather than the size of those variables. If none of these assumptions are accepted, it would be impossible to achieve both O(n) time complexity and O(1) space complexity.
Explanation
Whoo boy, this one took an embarrassingly long time to think up a bit of brain power.
So, going for the bonus is difficult. We need both to operate over the entire list exactly once and track which values we've already iterated over without additional space complexity.
Bit manipulation solves those problems. We initialize our O(1) 'storage', a pair of integers, then iterate through the list, OR-ing the ith bit in our first integer and storing that result to the second.
For instance, if we have 1101, and we perform an OR operation with 10, we get 1111. If we do another OR with 10, we still have 1101.
Ergo, once we perform the OR operation and end up with the same number, we've found our duplicate. No duplicates in the array causes the program to run over and throw an exception.
Python 2, 71 65 bytes
Returns None if there is no duplicate element
Edit: -6 bytes thanks to @musicman523
def f(n):
for a in n:
u=-abs(a)
if n[u]<0:return-u
n[u]=-n[u]
O(n) time complexity, O(n) space complexity, O(1) auxiliary space.
As the input list uses O(n) space, the space complexity is bound by this. Meaning we cannot have a lower space complexity than O(n)
Does modify the original list, if this is not allowed we could do it in the same complexity with 129 bytes
Explanation
Since every element is greater than 0 and less than or equal to the size of the list, the list has for each element a, an element on index a - 1 (0 indexed). We exploit this by saying that if the element at index i is negative, we have seen it before.
For each element a in the list n, we let u be negative the absolute value of a. (We let it be negative since python can index lists with negative indices, and we would otherwise need to do u=abs(a)-1) If the element at index u in the list is negative, we have seen it before and can therefore return -u (to get the absolute value of a, as all elements are positive). Else we set the element at index u to be negative, to remember that we have seen an element of value a before.
Python 2, 59 bytes, O(n) time, O(n) memory
a=input()
i=0
for x in a:
if i&1<<x:print x;break
i^=1<<x
This does one pass of the list. Thus is O(n) For memory it stores a integer i, which has bits representing which numbers have already been visited. If a number has already been visited we output, otherwise we turn the bit on. If no matches are found we do nothing.
This makes a slight improvement over the naïve way which requires copying the list at the cost of O(n log n) memory.
Perl 5, 36 + 2 (-ap) = 38 bytes
Runs in O(n) time.
$s{$_}=1while!$s{$_=shift@F};$_||=-1
Takes the input list space separated.
Dyalog APL, 27 24 20 19 13 12 11 bytes
⊢⊃⍨0⍳⍨⊢=⍴↑∪
Now modified to not depend on v16! Try it online!
How? (With input N)
⊢⊃⍨...- N at this index:⍴↑∪- N with duplicates removed, right-padded with0to fit N⊢=- Element-wise equality with N0⍳⍨- Index of the first0. `
Ruby, 28 36 bytes
Misunderstood the challenge the first time. O(n) time, O(n) space.
->a{d={};a.find{|e|b=d[e];d[e]=1;b}}
Retina, 26 24 bytes
1!`\b(\d+)\b(?<=\b\1 .*)
Try it online! Explanation: \b(\d+)\b matches each number in turn, and then the lookbehind looks to see whether the number is a duplicate; if it is the 1st match is ! output, rather than the count of matches. Unfortunately putting the lookbehind first doesn't seem to work, otherwise it would save several bytes. Edit: Added 7 bytes to comply with the Saved 2 bytes thanks to @MartinEnder.-1 return value on no match.
APL, 15
{⊃⍵[(⍳⍴⍵)~⍵⍳⍵]}
Seems like we can return 0 instead of -1 when there are no duplicates, (thanks Adám for the comment). So 3 bytes less.
A bit of description:
⍵⍳⍵ search the argument in itself: returns for each element the index of it's first occurrence
(⍳⍴⍵)~⍵⍳⍵ create a list of all indexes, remove those found in ⍵⍳⍵; i.e. remove all first elements
⊃⍵[...] of all remaining elements, take the first. If the array is empty, APL returns zero
For reference, old solution added -1 to the list at the end, so if the list ended up empty, it would contain -1 instead and the first element would be -1.
{⊃⍵[(⍳⍴⍵)~⍵⍳⍵],¯1}
Try it on tryapl.org
APL (Dyalog), 11 bytes
As per the new rules, throws an error if no duplicates exist.
⊢⊃⍨⍬⍴⍳∘≢~⍳⍨
⍳⍨ the indices of the first occurrence of each element
~ removed from
⍳∘≢ of all the indices
⍬⍴ reshape that into a scalar (gives zero if no data is available)
⊃⍨ use that to pick from (gives error on zero)
⊢ the argument
APL (Dyalog), 20 bytes
⊃n/⍨(,≢∪)¨,\n←⎕,2⍴¯1
2⍴¯1 negative one reshaped into a length-two list
⎕, get input (mnemonic: console box) and prepend to that
n← store that in n
,\ prefixes of n (lit. cumulative concatenation)
(…)¨ apply the following tacit function to each prefix
, [is] the ravel (just ensures that the prefix is a list)
≢ different from
∪ the unique elements[?] (i.e. is does the prefix have duplicates?)
n/⍨ use that to filter n (removes all elements until the first for which a duplicate was found)
⊃ pick the first element from that
C#, 65 67 bytes
With thanks to LiefdeWen for the 89 bytes base code here, here's an further shortened version of that
a=>{for(int p=0,q=0;;q++)for(p=0;p<q;)if(a[q]==a[p++])return a[q];}
We can dispense with the return -1 and length check as it's apparently OK to throw an exception if not found, so we just let the outer loop run off the end of the array. Some other whitespace changes, and jigging the declarations around to reduce the number of times we write "int" etc..
PROLOG (SWI), 54 + 3 = 57 bytes
f([H|_],L,H):-member(H,L).
f([H|T],L,X):-f(T,[H|L],X).
+3 bytes because it requires an empty list as its second argument:
f([5,3,2,1,2,3,5],[],X)
will unify X to the first duplicate value in the list.
Here's the basic algorithm: we have the list to parse, and an accumulator list that starts empty. For each element in the list: pop that element. If it is in the accumulator, return the element. Else, put it in the accumulator.
Dyalog APL Classic, 18 chars
Only works in ⎕IO←0.
w[⊃(⍳∘≢~⍳⍨)w←¯1,⎕]
Remove from the list of indices of the elements of the argument with a prepended "-1" the list indices of its nub and then pick the first of what's left. If after the removal there only remains an empty vector, its first element is by definition 0 which is used to index the extended argument producing the desired -1.
Haskell, 78 69 bytes
fst.foldl(\(i,a)(j,x)->(last$i:[j|i<0,elem x a],x:a))(-1,[]).zip[1..]
Saved 9 bytes thanks to @nimi
A basic path through the list. If the current element has not yet been seen (i<0) and is in the accumulator list (elem x a) then store the current index. Else, keep the index -1. In any case, add the current element to the accumulator list.
EDIT: I did not read the question carefully enough: this code outputs the index of the second element of a duplicate element.
Haskell, 35 bytes
f s(h:t)|h`elem`s=h|1<2=f(h:s)t
f[]
Try it online! Crashes if no duplicate is found.
J, 12 bytes
,&_1{~~:i.0:
Explanation
,&_1{~~:i.0: Input: array M
~: Nub-sieve
0: The constant 0
i. Find the index of the first occurrence of 0 (the first duplicate)
,&_1 Append -1 to M
{~ Select the value from the previous at the index of the first duplicate
Python 2, 34 bytes
O(n2) time, O(n) space
Saved 3 bytes thanks to @vaultah, and 3 more from @xnor!
lambda l:l[map(l.remove,set(l))<0]
Perl 6, 13 bytes
*.repeated[0]
Explanation
The
*is in a Term position so the whole statement is a WhateverCode lambda.The
.repeatedis a method that results in every value except for the first time each value was seen.say [2, 3, 3, 3, 1, 5, 2, 3].repeated.perl; # (3, 3, 2, 3).Seq # ( 3, 3, 2, 3).Seq[0]just returns the first value in the Seq.
If there is no value Nil is returned.
(Nil is the base of the Failure types, and all types are their own undefined value, so Nil different than an undefined value in most other languages)
Note that since the implementation of .repeated generates a Seq that means it doesn't start doing any work until you ask for a value, and it only does enough work to generate what you ask for.
So it would be easy to argue this has at worst O(n) time complexity, and at best O(2) time complexity if the second value is a repeat of the first.
Similar can probably be said of memory complexity.
J, 17 16 bytes
(*/{_1,~i.&0)@~:
How?
(*/{_1,~i.&0)@~:
@~: returns the nub sieve which is a vector with 1 for the first occurrence of an element in the argument and 0 otherwise
i.&0 returns the first index of duplication
_1,~ appends _1 to the index
*/ returns 0 with duplicates (product across nub sieve)
{ select _1 if no duplicates, otherwise return the index
Javascript, 54 bytes
a=>(b=[],a.find(e=>b.includes(e)?e:(b.push(e),0))||-1)
Uses another array to keep track of the already encountered values.
R, 34 bytes
c((x=scan())[duplicated(x)],-1)[1]
Cut a few characters off the answer from @djhurio, don't have enough reputation to comment though.
C#, 145 bytes
using System.Linq;a=>{var d=a.Where(n=>a.Count(t=>t==n)>1);return d.Select((n,i)=>new{n,i}).FirstOrDefault(o=>d.Take(o.i).Contains(o.n))?.n??-1;}
Probably a lot shorter way to do this in C# with a simple loop but I wanted to try it with Linq.
Full/Formatted version:
namespace System.Linq
{
class P
{
static void Main()
{
Func<int[], int> f = a =>
{
var d = a.Where(n => a.Count(t => t == n) > 1);
return d.Select((n, i) => new { n, i }).FirstOrDefault(o => d.Take(o.i).Contains(o.n))?.n ?? -1;
};
Console.WriteLine(f(new[] { 2, 3, 3, 1, 5, 2 }));
Console.WriteLine(f(new[] { 2, 4, 3, 5, 1 }));
Console.ReadLine();
}
}
}
Axiom 96, bytes
g(a:List INT):INT==(for i in 2..#a repeat(for j in 1..i-1 repeat if a.i=a.j then return a.i);-1)
it is O(n^2)
Python 3, 94 92 bytes
O(n) time and O(1) extra memory.
def f(a):
r=-1
for i in range(len(a)):t=abs(a[i])-1;r=[r,i+1][a[t]<0>r];a[t]*=-1
return r
Explanation
The basic idea of the algorithm is to run through each element from left to right, keep track of the numbers that have appeared, and returning the number upon reaching a number that has already appeared, and return -1 after traversing each element.
However, it uses a clever way to store the numbers that have appeared without using extra memory: to store them as the sign of the element indexed by the number. For example, I can represent the fact that 2 and 3 has already appeared by having a[2] and a[3] negative, if the array is 1-indexed.
Pyth, 5 bytes
h.-Q{
Remove from Q the first appearance of every element in Q, then return the first element.
Jelly, 5 bytes
Ṛœ-QṪ
How it works
Ṛœ-QṪ Main link. Argument: A (array)
Ṛ Yield A, reversed.
Q Unique; yield A, deduplicated.
œ- Perform multiset subtraction.
This removes the rightmost occurrence of each unique element from reversed
A, which corresponds to the leftmost occurrence in A.
Ṫ Take; take the rightmost remaining element, i.e., the first duplicate of A.
Japt, 7 bytes
æ@bX ¦Y
Explanation
æ@ bX ¦ Y
UæXY{UbX !=Y} Ungolfed
Implicit: U = input array
UæXY{ } Return the first item X (at index Y) in U where
UbX the first index of X in U
!=Y is not equal to Y.
In other words, find the first item which has already occured.
Implicit: output result of last expression
Alternatively:
æ@¯Y øX
Explanation
æ@ ¯ Y øX
UæXY{Us0Y øX} Ungolfed
Implicit: U = input array
UæXY{ } Return the first item X (at index Y) in U where
Us0Y the first Y items of U (literally U.slice(0, Y))
øX contains X.
In other words, find the first item which has already occured.
Implicit: output result of last expression
JavaScript (ES6), 47 36 31 25 bytes
Saved 6 bytes thanks to ThePirateBay
Returns undefined if no solution exists.
Time complexity: O(n) :-)
Space complexity: O(n) :-(
a=>a.find(c=>!(a[-c]^=1))
How?
We keep track of already encountered values by saving them as new properties of the original array a by using negative numbers. This way, they can't possibly interfere with the original entries.
Demo
let f =
a=>a.find(c=>!(a[-c]^=1))
console.log(f([2, 3, 3, 1, 5, 2]))
console.log(f([2, 4, 3, 5, 1]))
console.log(f([1, 2, 3, 4, 1]))
Mathematica, 24 bytes
#/.{h=___,a_,h,a_,h}:>a&
Mathematica's pattern matching capability is so cool!
Returns the original List for invalid input.
Explanation
#/.
In the input, replace...
{h=___,a_,h,a_,h}
A List with a duplicate element, with 0 or more elements before, between, and after the duplicates...
... :>a
With the duplicate element.
Jelly, 6 bytes
xŒQ¬$Ḣ
Returns the first duplicate, or 0 if there is no duplicate.
Explanation
xŒQ¬$Ḣ Input: array M
$ Operate on M
ŒQ Distinct sieve - Returns a boolean mask where an index is truthy
for the first occurrence of an element
¬ Logical NOT
x Copy each value in M that many times
Ḣ Head
