Data Structures Tutorial

Data Structures Tutorial Asymptotic Notation Structure and Union Array Data Structure Linked list Data Structure Type of Linked list Advantages and Disadvantages of linked list Queue Data Structure Implementation of Queue Stack Data Structure Implementation of Stack Sorting Insertion sort Quick sort Selection sort Heap sort Merge sort Bucket sort Count sort Radix sort Shell sort Tree Traversal of the binary tree Binary search tree Graph Spanning tree Linear Search Binary Search Hashing Collision Resolution Techniques

Misc Topic:

Priority Queue in Data Structure Deque in Data Structure Difference Between Linear And Non Linear Data Structures Queue Operations In Data Structure About Data Structures Data Structures Algorithms Types of Data Structures Big O Notations Introduction to Arrays Introduction to 1D-Arrays Operations on 1D-Arrays Introduction to 2D-Arrays Operations on 2D-Arrays Strings in Data Structures String Operations Application of 2D array Bubble Sort Insertion Sort Sorting Algorithms What is DFS Algorithm What Is Graph Data Structure What is the difference between Tree and Graph What is the difference between DFS and BFS Bucket Sort Dijkstra’s vs Bellman-Ford Algorithm Linear Queue Data Structure in C Stack Using Array Stack Using Linked List Recursion in Fibonacci Stack vs Array What is Skewed Binary Tree Primitive Data Structure in C Dynamic memory allocation of structure in C Application of Stack in Data Structures Binary Tree in Data Structures Heap Data Structure Recursion - Factorial and Fibonacci What is B tree what is B+ tree Huffman tree in Data Structures Insertion Sort vs Bubble Sort Adding one to the number represented an array of digits Bitwise Operators and their Important Tricks Blowfish algorithm Bubble Sort vs Selection Sort Hashing and its Applications Heap Sort vs Merge Sort Insertion Sort vs Selection Sort Merge Conflicts and ways to handle them Difference between Stack and Queue AVL tree in data structure c++ Bubble sort algorithm using Javascript Buffer overflow attack with examples Find out the area between two concentric circles Lowest common ancestor in a binary search tree Number of visible boxes putting one inside another Program to calculate the area of the circumcircle of an equilateral triangle Red-black Tree in Data Structures Strictly binary tree in Data Structures 2-3 Trees and Basic Operations on them Asynchronous advantage actor-critic (A3C) Algorithm Bubble Sort vs Heap Sort Digital Search Tree in Data Structures Minimum Spanning Tree Permutation Sort or Bogo Sort Quick Sort vs Merge Sort Boruvkas algorithm Bubble Sort vs Quick Sort Common Operations on various Data Structures Detect and Remove Loop in a Linked List How to Start Learning DSA Print kth least significant bit number Why is Binary Heap Preferred over BST for Priority Queue Bin Packing Problem Binary Tree Inorder Traversal Burning binary tree Equal Sum What is a Threaded Binary Tree? What is a full Binary Tree? Bubble Sort vs Merge Sort B+ Tree Program in Q language Deletion Operation from A B Tree Deletion Operation of the binary search tree in C++ language Does Overloading Work with Inheritance Balanced Binary Tree Binary tree deletion Binary tree insertion Cocktail Sort Comb Sort FIFO approach Operations of B Tree in C++ Language Recaman’s Sequence Tim Sort Understanding Data Processing Applications of trees in data structures Binary Tree Implementation Using Arrays Convert a Binary Tree into a Binary Search Tree Create a binary search tree Horizontal and Vertical Scaling Invert binary tree LCA of binary tree Linked List Representation of Binary Tree Optimal binary search tree in DSA Serialize and Deserialize a Binary Tree Tree terminology in Data structures Vertical Order Traversal of Binary Tree What is a Height-Balanced Tree in Data Structure Convert binary tree to a doubly linked list Fundamental of Algorithms Introduction and Implementation of Bloom Filter Optimal binary search tree using dynamic programming Right side view of binary tree Symmetric binary tree Trim a binary search tree What is a Sparse Matrix in Data Structure What is a Tree in Terms of a Graph What is the Use of Segment Trees in Data Structure What Should We Learn First Trees or Graphs in Data Structures All About Minimum Cost Spanning Trees in Data Structure Convert Binary Tree into a Threaded Binary Tree Difference between Structured and Object-Oriented Analysis FLEX (Fast Lexical Analyzer Generator) Object-Oriented Analysis and Design Sum of Nodes in a Binary Tree What are the types of Trees in Data Structure What is a 2-3 Tree in Data Structure What is a Spanning Tree in Data Structure What is an AVL Tree in Data Structure Given a Binary Tree, Check if it's balanced B Tree in Data Structure Convert Sorted List to Binary Search Tree Flattening a Linked List Given a Perfect Binary Tree, Reverse Alternate Levels Left View of Binary Tree What are Forest Trees in Data Structure Compare Balanced Binary Tree and Complete Binary Tree Diameter of a Binary Tree Given a Binary Tree Check the Zig Zag Traversal Given a Binary Tree Print the Shortest Path Given a Binary Tree Return All Root To Leaf Paths Given a Binary Tree Swap Nodes at K Height Given a Binary Tree Find Its Minimum Depth Given a Binary Tree Print the Pre Order Traversal in Recursive Given a Generate all Structurally Unique Binary Search Trees Perfect Binary Tree Threaded Binary Trees Function to Create a Copy of Binary Search Tree Function to Delete a Leaf Node from a Binary Tree Function to Insert a Node in a Binary Search Tree Given Two Binary Trees, Check if it is Symmetric A Full Binary Tree with n Nodes Applications of Different Linked Lists in Data Structure B+ Tree in Data Structure Construction of B tree in Data Structure Difference between B-tree and Binary Tree Finding Rank in a Binary Search Tree Finding the Maximum Element in a Binary Tree Finding the Minimum and Maximum Value of a Binary Tree Finding the Sum of All Paths in a Binary Tree Time Complexity of Selection Sort in Data Structure How to get Better in Data Structures and Algorithms Binary Tree Leaf Nodes Classification of Data Structure Difference between Static and Dynamic Data Structure Find the Union and Intersection of the Binary Search Tree Find the Vertical Next in a Binary Tree Finding a Deadlock in a Binary Search Tree Finding all Node of k Distance in a Binary Tree Finding Diagonal Sum in a Binary Tree Finding Diagonal Traversal of The Binary Tree Finding In-Order Successor Binary Tree Finding the gcd of Each Sibling of the Binary Tree Greedy Algorithm in Data Structure How to Calculate Space Complexity in Data Structure How to find missing numbers in an Array Kth Ancestor Node of Binary Tree Minimum Depth Binary Tree Mirror Binary Tree in Data Structure Red-Black Tree Insertion Binary Tree to Mirror Image in Data Structure Calculating the Height of a Binary Search Tree in Data Structure Characteristics of Binary Tree in Data Structure Create a Complete Binary Tree from its Linked List Field in Tree Data Structure Find a Specified Element in a binary Search Tree Find Descendant in Tree Data Structure Find Siblings in a Binary Tree Given as an Array Find the Height of a Node in a Binary Tree Find the Second-Largest Element in a Binary Tree Find the Successor Predecessor of a Binary Search Tree Forest of a Tree in Data Structure In Order Traversal of Threaded Binary Tree Introduction to Huffman Coding Limitations of a Binary Search Tree Link State Routing Algorithm in Data Structure Map Reduce Algorithm for Binary Search Tree in Data Structure Non-Binary Tree in Data Structure Quadratic Probing Example in Hashing Scope and Lifetime of Variables in Data Structure Separate Chaining in Data Structure What is Dynamic Data Structure Separate Chaining vs Open Addressing Time and Space Complexity of Linear Data Structures Abstract Data Types in Data Structures Binary Tree to Single Linked List Count the Number of Nodes in the Binary Tree Count Total No. of Ancestors in a Binary Search Tree Elements of Dynamic Programming in Data Structures Find cost of tree with prims algorithm in data structures Find Preorder Successor in a Threaded Binary Tree Find Prime Nodes Sum Count in Non-Binary Tree Find the Right Sibling of a Binary Tree with Parent Pointers Find the Width of the Binary Search Tree Forest trees in Data Structures Free Tree in Data Structures Frequently asked questions in Tree Data Structures Infix, Postfix and Prefix Conversion Time Complexity of Fibonacci Series What is Weighted Graph in Data Structure Disjoint Set ADT in Data Structure Binary Tree to Segment Tree Binary Tree to List in Order State Space Tree for 4 Queen Problem Hash Function Booth Algorithm Flowchart What is an Algorithm Master Theorem Top-down and Bottom-up Approach in Data Structure Base Address of Array Insertion into a Max Heap in Data Structure Delete a Node From Linked List Find Loop in Linked List How to implement Forward DNS Lookup Cache? How to Implement Reverse DNS Look Up Cache? Primitive vs non primitive data structure Concurrency Algorithms GCD Using Recursion Priority Queue using Linked List Difference between Array and Structure Conversion of Binary to Gray Code

Double Hashing in Data Structure

Introduction

Hashing is a common technique used in data structures to map keys to indices in an array. The idea behind hashing is to use a hash function to convert a key into an array index. However, a hash function can produce collisions, where two different keys are mapped to the same index. Double hashing is a technique used to resolve collisions in hash tables.

What is Double Hashing?

Double hashing is a collision resolution technique in which the hash function generates a secondary hash function that is used to compute the next index to check. The secondary hash function is designed to produce a different value for each key, reducing the probability of collisions. Double hashing is a variation of open addressing, which means that the hash table is an array that can hold multiple items.

The basic idea of double hashing is to use two hash functions to generate a sequence of indices that are probed in order to find an empty slot in the hash table. The first hash function is used to calculate the initial index of the key, while the second hash function is used to calculate the offset from the initial index. The offset is added to the initial index, and the resulting index is probed. If the slot is empty, the key is inserted into the slot. If the slot is occupied, the next index in the sequence is probed until an empty slot is found.

Double hashing provides good performance because it produces a sequence of indices that are guaranteed to be unique for each key, reducing the probability of collisions. In addition, double hashing is easy to implement and does not require additional memory to store pointers to linked lists, which is a common technique used in separate chaining.

Double Hashing Algorithm

The double hashing algorithm can be described as follows:

  1. Initialize an empty hash table with a fixed size.
  2. Define two hash functions, h1(key) and h2(key).
  3. Calculate the initial index i = h1(key) % table_size.
  4. Calculate the offset j = h2(key) % table_size.
  5. Probe the hash table starting at index i.
  6. If the slot at index i is empty, insert the key into the slot and exit.
  7. If the slot at index i is occupied, increment i by j and repeat step 6 until an empty slot is found.
  8. If the entire hash table has been probed without finding an empty slot, the hash table is full.

The size of the hash table is an important factor in the performance of double hashing. If the hash table is too small, there will be a higher probability of collisions, which will result in longer search times. If the hash table is too large, there will be a lot of empty slots, which will waste memory.

Choosing the hash functions is also important in double hashing. The hash functions should be designed to produce a wide range of values to reduce the probability of collisions. In addition, the hash functions should be fast to compute to avoid slowing down the hash table operations.

Double Hashing Example

Let us consider an example to understand how double hashing works. Suppose we have a hash table of size 10 and the following keys need to be inserted into the hash table: 23, 34, 45, 56, 67, 78, 89, 90.

We can define the two hash functions as follows:

h1(key) = key % 10
h2(key) = 7 - (key % 7)

Using these hash functions, we can calculate the initial index and offset for each key as follows:

key = 23, i = 3, j = 5
key = 34, i = 4, j = 4
key = 45, i = 5, j = 3
key = 56, i = 6, j = 2
key = 67, i = 7, j = 1
key = 78, i = 8, j = 7
key = 89, i = 9, j = 6
key = 90, i = 0, j = 4

Now, we can start probing the hash table starting at the initial index for each key. For example, for key 23, we start at index 3 and check if the slot is empty. Since it is empty, we insert the key into the slot. For key 34, we start at index 4 and find that the slot is already occupied, so we add the offset 4 to the initial index and check the slot at index 8. This slot is also occupied, so we add the offset 4 again and check the slot at index 2. This slot is empty, so we insert the key into the slot.

For the remaining keys, we follow a similar process until all keys are inserted into the hash table.

The final hash table looks like this:

0: 90
1:
2: 23
3:
4: 34
5: 45
6: 56
7: 67
8: 78
9: 89

As we can see, all keys have been successfully inserted into the hash table using double hashing.

Conclusion

Double hashing is a collision resolution technique used in hash tables to reduce the probability of collisions. Double hashing generates a sequence of indices based on two hash functions that are used to probe the hash table until an empty slot is found. Double hashing is fast, memory-efficient, and easy to implement. However, it requires good hash functions to generate a unique sequence of indices for each key and can suffer from clustered data. Overall, double hashing is a useful technique in data structures for implementing hash tables.