Enviar búsqueda
Cargar
Ds 8
•
2 recomendaciones
•
885 vistas
Niit Care
Seguir
Tecnología
Educación
Denunciar
Compartir
Denunciar
Compartir
1 de 21
Recomendados
Hashing
Hashing
Abbas Ali
Hash tables
Hash tables
Chester Hartin
Application of hashing in better alg design tanmay
Application of hashing in better alg design tanmay
Tanmay 'Unsinkable'
Hashing Technique In Data Structures
Hashing Technique In Data Structures
SHAKOOR AB
Data Structure and Algorithms Hashing
Data Structure and Algorithms Hashing
ManishPrajapati78
Hashing
Hashing
VARSHAKUMARI49
Hashing
Hashing
Dinesh Vujuru
Hashing
Hashing
SatishKumarInumarthi
Recomendados
Hashing
Hashing
Abbas Ali
Hash tables
Hash tables
Chester Hartin
Application of hashing in better alg design tanmay
Application of hashing in better alg design tanmay
Tanmay 'Unsinkable'
Hashing Technique In Data Structures
Hashing Technique In Data Structures
SHAKOOR AB
Data Structure and Algorithms Hashing
Data Structure and Algorithms Hashing
ManishPrajapati78
Hashing
Hashing
VARSHAKUMARI49
Hashing
Hashing
Dinesh Vujuru
Hashing
Hashing
SatishKumarInumarthi
Hashing data
Hashing data
umair khan
4.4 hashing
4.4 hashing
Krish_ver2
Hashing 1
Hashing 1
Shyam Khant
Hashing in datastructure
Hashing in datastructure
rajshreemuthiah
Hashing
Hashing
debolina13
Hashing notes data structures (HASHING AND HASH FUNCTIONS)
Hashing notes data structures (HASHING AND HASH FUNCTIONS)
Kuntal Bhowmick
Hash table
Hash table
Rajendran
Hashing PPT
Hashing PPT
Saurabh Kumar
Hashing
Hashing
amoldkul
Hashing
Hashing
Sri Prasanna
linear probing
linear probing
rajshreemuthiah
Hashing algorithms and its uses
Hashing algorithms and its uses
Jawad Khan
Hash Tables in data Structure
Hash Tables in data Structure
Prof Ansari
Hashing
Hashing
Dawood Faheem Abbasi
08 Hash Tables
08 Hash Tables
Andres Mendez-Vazquez
Hashing
Hashing
grahamwell
Hashing Algorithm
Hashing Algorithm
Hayi Nukman
Ch17 Hashing
Ch17 Hashing
leminhvuong
Hashing
Hashing
kurubameena1
Chapter 12 ds
Chapter 12 ds
Hanif Durad
11 ds and algorithm session_16
11 ds and algorithm session_16
Niit Care
Dacj 2-2 c
Dacj 2-2 c
Niit Care
Más contenido relacionado
La actualidad más candente
Hashing data
Hashing data
umair khan
4.4 hashing
4.4 hashing
Krish_ver2
Hashing 1
Hashing 1
Shyam Khant
Hashing in datastructure
Hashing in datastructure
rajshreemuthiah
Hashing
Hashing
debolina13
Hashing notes data structures (HASHING AND HASH FUNCTIONS)
Hashing notes data structures (HASHING AND HASH FUNCTIONS)
Kuntal Bhowmick
Hash table
Hash table
Rajendran
Hashing PPT
Hashing PPT
Saurabh Kumar
Hashing
Hashing
amoldkul
Hashing
Hashing
Sri Prasanna
linear probing
linear probing
rajshreemuthiah
Hashing algorithms and its uses
Hashing algorithms and its uses
Jawad Khan
Hash Tables in data Structure
Hash Tables in data Structure
Prof Ansari
Hashing
Hashing
Dawood Faheem Abbasi
08 Hash Tables
08 Hash Tables
Andres Mendez-Vazquez
Hashing
Hashing
grahamwell
Hashing Algorithm
Hashing Algorithm
Hayi Nukman
Ch17 Hashing
Ch17 Hashing
leminhvuong
Hashing
Hashing
kurubameena1
Chapter 12 ds
Chapter 12 ds
Hanif Durad
La actualidad más candente
(20)
Hashing data
Hashing data
4.4 hashing
4.4 hashing
Hashing 1
Hashing 1
Hashing in datastructure
Hashing in datastructure
Hashing
Hashing
Hashing notes data structures (HASHING AND HASH FUNCTIONS)
Hashing notes data structures (HASHING AND HASH FUNCTIONS)
Hash table
Hash table
Hashing PPT
Hashing PPT
Hashing
Hashing
Hashing
Hashing
linear probing
linear probing
Hashing algorithms and its uses
Hashing algorithms and its uses
Hash Tables in data Structure
Hash Tables in data Structure
Hashing
Hashing
08 Hash Tables
08 Hash Tables
Hashing
Hashing
Hashing Algorithm
Hashing Algorithm
Ch17 Hashing
Ch17 Hashing
Hashing
Hashing
Chapter 12 ds
Chapter 12 ds
Destacado
11 ds and algorithm session_16
11 ds and algorithm session_16
Niit Care
Dacj 2-2 c
Dacj 2-2 c
Niit Care
Niit Care
Oops recap
Oops recap
Niit Care
Vb.net session 09
Vb.net session 09
Niit Care
15 ooad uml-20
15 ooad uml-20
Niit Care
09 iec t1_s1_oo_ps_session_13
09 iec t1_s1_oo_ps_session_13
Niit Care
OOP Java
OOP Java
Saif Kassim
Rdbms xp 01
Rdbms xp 01
Niit Care
Jdbc session01
Jdbc session01
Niit Care
Computer
Computer
Shivangi Shah
Security in the Real World - JavaOne 2013
Security in the Real World - JavaOne 2013
MattKilner
Probabilistic Data Structures and Approximate Solutions Oleksandr Pryymak
Probabilistic Data Structures and Approximate Solutions Oleksandr Pryymak
PyData
14 ooad uml-19
14 ooad uml-19
Niit Care
Deawsj 7 ppt-2_c
Deawsj 7 ppt-2_c
Niit Care
Java Garbage Collection - How it works
Java Garbage Collection - How it works
Mindfire Solutions
Understanding Java Garbage Collection - And What You Can Do About It
Understanding Java Garbage Collection - And What You Can Do About It
Azul Systems Inc.
Aae oop xp_06
Aae oop xp_06
Niit Care
Dacj 1-1 a
Dacj 1-1 a
Niit Care
Faster persistent data structures through hashing
Faster persistent data structures through hashing
Johan Tibell
Destacado
(20)
11 ds and algorithm session_16
11 ds and algorithm session_16
Dacj 2-2 c
Dacj 2-2 c
Oops recap
Oops recap
Vb.net session 09
Vb.net session 09
15 ooad uml-20
15 ooad uml-20
09 iec t1_s1_oo_ps_session_13
09 iec t1_s1_oo_ps_session_13
OOP Java
OOP Java
Rdbms xp 01
Rdbms xp 01
Jdbc session01
Jdbc session01
Computer
Computer
Security in the Real World - JavaOne 2013
Security in the Real World - JavaOne 2013
Probabilistic Data Structures and Approximate Solutions Oleksandr Pryymak
Probabilistic Data Structures and Approximate Solutions Oleksandr Pryymak
14 ooad uml-19
14 ooad uml-19
Deawsj 7 ppt-2_c
Deawsj 7 ppt-2_c
Java Garbage Collection - How it works
Java Garbage Collection - How it works
Understanding Java Garbage Collection - And What You Can Do About It
Understanding Java Garbage Collection - And What You Can Do About It
Aae oop xp_06
Aae oop xp_06
Dacj 1-1 a
Dacj 1-1 a
Faster persistent data structures through hashing
Faster persistent data structures through hashing
Similar a Ds 8
asdfew.pptx
asdfew.pptx
hunterkurosaki
Data Structures : hashing (1)
Data Structures : hashing (1)
Home
unit-1-dsa-hashing-2022_compressed-1-converted.pptx
unit-1-dsa-hashing-2022_compressed-1-converted.pptx
BabaShaikh3
Hashing and Hash Tables
Hashing and Hash Tables
adil raja
Hashing
Hashing
LavanyaJ28
Hashing and File Structures in Data Structure.pdf
Hashing and File Structures in Data Structure.pdf
JaithoonBibi
Hash in datastructures by using the c language.pptx
Hash in datastructures by using the c language.pptx
my6305874
Presentation.pptx
Presentation.pptx
AgonySingh
Bloom Filters: An Introduction
Bloom Filters: An Introduction
IRJET Journal
Hashing.pptx
Hashing.pptx
kratika64
Implementação do Hash Coalha/Coalesced
Implementação do Hash Coalha/Coalesced
CriatividadeZeroDocs
Chapter 10: hashing data structure
Chapter 10: hashing data structure
Mahmoud Alfarra
introduction to trees,graphs,hashing
introduction to trees,graphs,hashing
Akhil Prem
Performance Analysis of Hashing Mathods on the Employment of App
Performance Analysis of Hashing Mathods on the Employment of App
IJECEIAES
Data Structure and Algorithms: What is Hash Table ppt
Data Structure and Algorithms: What is Hash Table ppt
JUSTFUN40
11. Hashing - Data Structures using C++ by Varsha Patil
11. Hashing - Data Structures using C++ by Varsha Patil
widespreadpromotion
Hash pre
Hash pre
Waed Shagareen
Similarity-preserving hash for content-based audio retrieval using unsupervis...
Similarity-preserving hash for content-based audio retrieval using unsupervis...
IJECEIAES
DS THEORY 35.pptx
DS THEORY 35.pptx
veenatanmaipatlolla
Hashing And Hashing Tables
Hashing And Hashing Tables
Chinmaya M. N
Similar a Ds 8
(20)
asdfew.pptx
asdfew.pptx
Data Structures : hashing (1)
Data Structures : hashing (1)
unit-1-dsa-hashing-2022_compressed-1-converted.pptx
unit-1-dsa-hashing-2022_compressed-1-converted.pptx
Hashing and Hash Tables
Hashing and Hash Tables
Hashing
Hashing
Hashing and File Structures in Data Structure.pdf
Hashing and File Structures in Data Structure.pdf
Hash in datastructures by using the c language.pptx
Hash in datastructures by using the c language.pptx
Presentation.pptx
Presentation.pptx
Bloom Filters: An Introduction
Bloom Filters: An Introduction
Hashing.pptx
Hashing.pptx
Implementação do Hash Coalha/Coalesced
Implementação do Hash Coalha/Coalesced
Chapter 10: hashing data structure
Chapter 10: hashing data structure
introduction to trees,graphs,hashing
introduction to trees,graphs,hashing
Performance Analysis of Hashing Mathods on the Employment of App
Performance Analysis of Hashing Mathods on the Employment of App
Data Structure and Algorithms: What is Hash Table ppt
Data Structure and Algorithms: What is Hash Table ppt
11. Hashing - Data Structures using C++ by Varsha Patil
11. Hashing - Data Structures using C++ by Varsha Patil
Hash pre
Hash pre
Similarity-preserving hash for content-based audio retrieval using unsupervis...
Similarity-preserving hash for content-based audio retrieval using unsupervis...
DS THEORY 35.pptx
DS THEORY 35.pptx
Hashing And Hashing Tables
Hashing And Hashing Tables
Más de Niit Care
Ajs 1 b
Ajs 1 b
Niit Care
Ajs 4 b
Ajs 4 b
Niit Care
Ajs 4 a
Ajs 4 a
Niit Care
Ajs 4 c
Ajs 4 c
Niit Care
Ajs 3 b
Ajs 3 b
Niit Care
Ajs 3 a
Ajs 3 a
Niit Care
Ajs 3 c
Ajs 3 c
Niit Care
Ajs 2 b
Ajs 2 b
Niit Care
Ajs 2 a
Ajs 2 a
Niit Care
Ajs 2 c
Ajs 2 c
Niit Care
Ajs 1 a
Ajs 1 a
Niit Care
Ajs 1 c
Ajs 1 c
Niit Care
Dacj 4 2-c
Dacj 4 2-c
Niit Care
Dacj 4 2-b
Dacj 4 2-b
Niit Care
Dacj 4 2-a
Dacj 4 2-a
Niit Care
Dacj 4 1-c
Dacj 4 1-c
Niit Care
Dacj 4 1-b
Dacj 4 1-b
Niit Care
Dacj 4 1-a
Dacj 4 1-a
Niit Care
Dacj 1-2 b
Dacj 1-2 b
Niit Care
Dacj 1-3 c
Dacj 1-3 c
Niit Care
Más de Niit Care
(20)
Ajs 1 b
Ajs 1 b
Ajs 4 b
Ajs 4 b
Ajs 4 a
Ajs 4 a
Ajs 4 c
Ajs 4 c
Ajs 3 b
Ajs 3 b
Ajs 3 a
Ajs 3 a
Ajs 3 c
Ajs 3 c
Ajs 2 b
Ajs 2 b
Ajs 2 a
Ajs 2 a
Ajs 2 c
Ajs 2 c
Ajs 1 a
Ajs 1 a
Ajs 1 c
Ajs 1 c
Dacj 4 2-c
Dacj 4 2-c
Dacj 4 2-b
Dacj 4 2-b
Dacj 4 2-a
Dacj 4 2-a
Dacj 4 1-c
Dacj 4 1-c
Dacj 4 1-b
Dacj 4 1-b
Dacj 4 1-a
Dacj 4 1-a
Dacj 1-2 b
Dacj 1-2 b
Dacj 1-3 c
Dacj 1-3 c
Último
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
Manik S Magar
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
LoriGlavin3
Training state-of-the-art general text embedding
Training state-of-the-art general text embedding
Zilliz
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
Fwdays
How to write a Business Continuity Plan
How to write a Business Continuity Plan
Databarracks
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
LoriGlavin3
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
Rick Flair
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
LoriGlavin3
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
LoriGlavin3
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
LoriGlavin3
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
MounikaPolabathina
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Mark Simos
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
Sergiu Bodiu
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
ScyllaDB
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
HarshalMandlekar2
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
LoriGlavin3
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
Pixlogix Infotech
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
BookNet Canada
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
BookNet Canada
Último
(20)
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
Training state-of-the-art general text embedding
Training state-of-the-art general text embedding
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
How to write a Business Continuity Plan
How to write a Business Continuity Plan
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Ds 8
1.
Introduction to Hashing
Techniques Objectives In this lesson, you will learn to: Randomly access data by using a hash index Implement Hashing function Define different hashing techniques Define collision and how collisions are handled Create a hash index and use it, to randomly access data from a file, using the key field Introduction to Hashing Techniques/Lesson 8/Slide 1 of 21 ©NIIT
2.
Introduction to Hashing
Techniques Hashing It means converting a key to an address to retrieve a record. Given a key, the offset of the record can be calculated with the following formula: Key * Record length Introduction to Hashing Techniques/Lesson 8/Slide 2 of 21 ©NIIT
3.
Introduction to Hashing
Techniques Hashing Functions Given a key, the hash function converts it into a hash value (location) within the range 1 -n, where n is the size of the storage (address) space that has been allocated for the records. The record is then retrieved at the location generated. Dividing is one of the commonly used hashing function. Introduction to Hashing Techniques/Lesson 8/Slide 3 of 21 ©NIIT
4.
Introduction to Hashing
Techniques Hashing Techniques Two hashing techniques commonly employed are: Hash indexes Hash tables The goal of both the techniques is same, which is as follows: To identify the location of a data record in a file using a key, to address transformation. Introduction to Hashing Techniques/Lesson 8/Slide 4 of 21 ©NIIT
5.
Introduction to Hashing
Techniques Hash Indexes An index created by placing keys in locations calculated using a hashing function is called a hash index file. It contains a key-offset pair corresponding to each record in the data file. Following two files are used in the technique employing hash index: A file containing the data records, and A hash index file. Introduction to Hashing Techniques/Lesson 8/Slide 5 of 21 ©NIIT
6.
Introduction to Hashing
Techniques Hash Tables Hash tables make use of data files only. It involves calculation of a location based on the value of a key. In this method, a whole record is inserted into the calculated position in the data file, i.e. the hash table. Introduction to Hashing Techniques/Lesson 8/Slide 6 of 21 ©NIIT
7.
Introduction to Hashing
Techniques Collisions An attempt to store two keys at the same position is known as collision. It will occur irrespective of the hashing function used. Introduction to Hashing Techniques/Lesson 8/Slide 7 of 21 ©NIIT
8.
Introduction to Hashing
Techniques Collision Processing Rehashing This method involves using a secondary hash function, called a rehashed function, on the hash value of the key. The rehash function is applied successively until an empty position is found. Introduction to Hashing Techniques/Lesson 8/Slide 8 of 21 ©NIIT
9.
Introduction to Hashing
Techniques Collision Processing (Contd..) Chaining This method uses links (pointers) to resolve hash clashes. Two chaining techniques are: Coalesed Chaining Separate Chaining Introduction to Hashing Techniques/Lesson 8/Slide 9 of 21 ©NIIT
10.
Introduction to Hashing
Techniques Coalesed Chaining It completely eliminates the possibility that more than one collision will occur even for the same hash value. It requires the storage area to be divided into two parts: A prime hash area An overflow area Introduction to Hashing Techniques/Lesson 8/Slide 10 of 21 ©NIIT
11.
Introduction to Hashing
Techniques Separate Chaining In this method, an array of header nodes is used. Each element in the array is a pointer, which stores the address of a distinct linked list. Each linked list is a list of records whose keys have the same hash values. When a record has to be retrieved, the hashing function converts the given key to yield a position (subscript) in the array. Introduction to Hashing Techniques/Lesson 8/Slide 11 of 21 ©NIIT
12.
Introduction to Hashing
Techniques Bucket Hashing The hashing of a key yield the position of a storage area in which several key entries can be stored. This storage area is called a bucket. The file is divided into a number of such buckets. Each bucket has enough space to store multiple values. When a record has to be retrieved, its key is hashed to give an offset. This offset is a bucket offset. Then the bucket is read into internal memory and searched sequentially. Introduction to Hashing Techniques/Lesson 8/Slide 12 of 21 ©NIIT
13.
Introduction to Hashing
Techniques Hash Indexes Vs Hash Tables The choice of hashing method depends on the following factors: Data Organization Access Speed Disk Space Requirement Introduction to Hashing Techniques/Lesson 8/Slide 13 of 21 ©NIIT
14.
Introduction to Hashing
Techniques An Example to Illustrate the Use of A Hash Table The assumptions made in this example are: The key is an alphanumeric field, the first byte of which is an alphabet. Only one key exists for a particular hash value. The problem of collisions is not being addressed. The file structure assumed is shown below: Field Length Type city 10 String Population 2 Integer Introduction to Hashing Techniques/Lesson 8/Slide 14 of 21 ©NIIT
15.
Introduction to Hashing
Techniques An Example to Illustrate the Use of A Hash Table (Contd..) The hashing algorithm used is as follows: the first letter from the alphabetic key is extracted and the position of this letter in the alphabet is used as the hash value. If the first letter in the key is C, then the hash value is 3. Thus, it is obvious that the number of positions (or buckets) that a key might hash to is 26, which is the number of letters in the alphabet. The processing required to create the hash table involves the following steps: Creating file space Introduction to Hashing Techniques/Lesson 8/Slide 15 of 21 ©NIIT
16.
Introduction to Hashing
Techniques An Example to Illustrate the Use of A Hash Table (Contd..) Accepting Data Find the correct bucket Writing to the hash table Introduction to Hashing Techniques/Lesson 8/Slide 16 of 21 ©NIIT
17.
Introduction to Hashing
Techniques Problem Statement 8.D.1 Create a hash table for records having structure given below: Field Size City 10 Population 2 The hashing algorithm used is as follows: the first letter from the alphabetic is used as the hash value. If the first letter in the key is C, then the hash value is 3. Thus, it is obvious that the number of positions(or buckets) that a key might hash to is 26, which is the number of letters in the alphabet. Introduction to Hashing Techniques/Lesson 8/Slide 17 of 21 ©NIIT
18.
Introduction to Hashing
Techniques Problem Statement 8.D.1 (Contd..) only one key exists for a particular hash value. In other words, there is only one record per bucket. The problem of collisions is not being addressed. The key is an alphanumeric field, the first byte of which is an alphabet. Introduction to Hashing Techniques/Lesson 8/Slide 18 of 21 ©NIIT
19.
Introduction to Hashing
Techniques Summary In this lesson, you learned that: Hashing is a technique used to access data stored in files Using hashing techniques, it is possible to calculate the position of a record in a data file from its key field value The main purpose of hashing is to eliminate unnecessary searching by using the method of direct access to retrieve a record. This is done by transforming the key to yield the offset of the record An algorithm called, a hashing function, is used to perform the key to address transformation Introduction to Hashing Techniques/Lesson 8/Slide 19 of 21 ©NIIT
20.
Introduction to Hashing
Techniques Summary (Contd..) It often happens that more than one key hashes to the same hash value resulting in collision. AS a result, an attempt is made to store two records in one location. Collisions are processed by using various algorithms, three of which are: Rehashing Linked list collision processing Bucket hashing Introduction to Hashing Techniques/Lesson 8/Slide 20 of 21 ©NIIT
21.
Introduction to Hashing
Techniques Summary (Contd..) Several hashing strategies can be employed, two of which are: Hash indexing Hash tables Introduction to Hashing Techniques/Lesson 8/Slide 21 of 21 ©NIIT
Notas del editor
Lower Bound and Upper Bound to denote the first element number and the last element number respectively
Lower Bound and Upper Bound to denote the first element number and the last element number respectively